ianwolf99 / WOLFGPTLinks
A computer programming AI bot in python django
☆50Updated last year
Alternatives and similar repositories for WOLFGPT
Users that are interested in WOLFGPT are comparing it to the libraries listed below
Sorting:
- Clipboard poisoning attack.☆58Updated 5 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆70Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆81Updated 2 months ago
- A tool for automatically change the Tor IP address over time.☆88Updated 2 months ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆42Updated 8 months ago
- A social engineering toolkit for performing smishing, and other sms attacks☆88Updated last year
- control windows computeur from telegram☆67Updated last year
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆147Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆62Updated 4 years ago
- Nmap & SQL injection automation tool☆35Updated 8 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆21Updated last year
- A social engineering tool designed to seamlessly locate profiles using usernames while offering convenient reverse image search functiona…☆100Updated last year
- Information Gathering Simplified.☆66Updated 2 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated last year
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆87Updated 8 months ago
- Rogue access point tool.☆59Updated 3 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆80Updated 11 months ago
- A custom Google search (to bypass some limitations on google and VPNs)☆114Updated last year
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆41Updated 6 months ago
- List of RAT's For android. To get any support on them contact t.me/efxtv☆47Updated last week
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆17Updated 2 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- FHook is a Command and Control server which allows an individual to accept connections from multiple remote clients via a remote access t…☆14Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆35Updated 11 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year