☆30Oct 3, 2025Updated 5 months ago
Alternatives and similar repositories for PAGASUS-PRO
Users that are interested in PAGASUS-PRO are comparing it to the libraries listed below
Sorting:
- ☆48Sep 26, 2025Updated 5 months ago
- ☆17May 1, 2025Updated 10 months ago
- A simple tool to help you discover admin panels on websites.☆36Jul 25, 2025Updated 7 months ago
- This is an enhanced Darkgpt☆29Jul 10, 2024Updated last year
- An effective tool for hacking starlink wifi password.☆20Apr 12, 2025Updated 11 months ago
- DEDSEC-VPN is a Linux-based VPN tool that hides your real IP and blocks IPv6 leaks.☆31Feb 21, 2026Updated last month
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- ☆21Aug 6, 2025Updated 7 months ago
- A curated list of GPT agents for cybersecurity☆21Feb 2, 2024Updated 2 years ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆26Sep 28, 2025Updated 5 months ago
- Find the zone of the mobile number using the suffix code☆13Aug 17, 2022Updated 3 years ago
- Bluetooth speaker killer☆34Jun 1, 2024Updated last year
- SMS flooding tool☆23May 3, 2025Updated 10 months ago
- ☆11Oct 4, 2018Updated 7 years ago
- The main purpose is to generate custom wordlists based on user-provided info (name, surname, nickname, team, date of birth, etc.). The to…☆33Aug 19, 2025Updated 7 months ago
- facebook bruteforce tool☆10Dec 3, 2023Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- sms2call app☆15Jul 20, 2025Updated 8 months ago
- WiFi Hacking Suite☆38Updated this week
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆42Jun 16, 2025Updated 9 months ago
- The simplest trading bot with a regular interval action and a goal to accumulate a position at a reduced cost-basis compared to standard …☆19Jul 1, 2025Updated 8 months ago
- ☆65Oct 18, 2025Updated 5 months ago
- Spoof the email and spams a persons inbox!☆13Jun 24, 2022Updated 3 years ago
- A lightweight OSINT tool for performing WHOIS checks, DNS lookups, email harvesting, and social media scanning.☆26Jun 6, 2025Updated 9 months ago
- 💸 "Buy The Dip" Bot - A Coinbase Pro semi-automated trading bot, built only for escalating buying and selling at percentage changes.☆29Feb 15, 2022Updated 4 years ago
- Toolkit of Python scripts for web security, network recon, login brute-forcing, and ARP spoofing experiments. Designed strictly for learn…☆29Nov 28, 2025Updated 3 months ago
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- USB Rubber Ducky Wiki☆11Jan 18, 2019Updated 7 years ago
- CraxsRat is a sophisticated Android remote access trojan (RAT) that grants cybercriminals extensive control over infected devices. It is …☆102Jul 9, 2024Updated last year
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- Convert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custo…☆39May 11, 2025Updated 10 months ago
- Docker environment for hackers☆17Jun 20, 2020Updated 5 years ago
- Ansible Roles for managing Azure Resources☆13Nov 11, 2025Updated 4 months ago
- WiFi hacking with aircrack-ng support scripts☆11Oct 4, 2017Updated 8 years ago
- ☆14Mar 8, 2026Updated 2 weeks ago
- ☆27Nov 13, 2025Updated 4 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆32Nov 22, 2025Updated 4 months ago
- Spam Brutal-WhatsApp 24 jam non stop☆66Jul 13, 2022Updated 3 years ago
- Complete React application of Numspy API.☆14Jul 31, 2020Updated 5 years ago