hazelnot / physjacker
An Electron app that does things that are very immoral and unethical
☆13Updated 7 years ago
Alternatives and similar repositories for physjacker:
Users that are interested in physjacker are comparing it to the libraries listed below
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆13Updated last year
- Anubis 7.0☆25Updated 5 months ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆34Updated 3 months ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆13Updated 3 years ago
- Hacking the target computer and receiving complete information such as passwords stored in the browser, session theft, cookie theft, cred…☆15Updated 2 years ago
- ADVANCE MAIL BOMBING WITH SPOOFING☆15Updated 3 years ago
- Advanced RDP Hacking Tool☆7Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆50Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- A Scampage-Builder tool is a malicious software or program designed to create scam web pages, often used in phishing attacks.☆19Updated last year
- Simple bulk email sender and filter☆17Updated 4 years ago
- A simple and handy tool for a hacker to gain remote access and control another computer☆33Updated 4 years ago
- A automated monero mining (injector) scripts which mines monero for you in targeted system☆59Updated 7 months ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆25Updated 3 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆27Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- A python tool for generating strong password☆11Updated 2 years ago
- +300 TOOLS in 1! IN ITALIANO☆13Updated 2 years ago
- Best social media phishing☆23Updated 4 years ago
- USE THIS TOOL AGAINST SPAMMERS, THIS TOOL IS SO POWERFULL. ITS MAIN ABILITY IS CALL FLOODING.☆22Updated 4 years ago
- Simple python script that attacks phishing sites database with fake random generated usernames and passwords to flood their databases wit…☆10Updated 3 years ago
- Fsociety Phishing Tool☆17Updated last year
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- A malicious access point that injects mining scripts on the fly.☆15Updated 4 years ago
- ☆14Updated 6 years ago
- Pegasus Loki Rat is Whatsapp RAT, it integrates new modules, like recording , lockscreen , and locate options. Pegasus Loki RAT is a Pyth…☆18Updated 8 months ago
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆20Updated 3 years ago
- Zombie Bot from Darkweb☆31Updated last year
- SHELL SCANNER☆18Updated 5 years ago