ianwolf99 / WOLFGPTLinks
A computer programming AI bot in python django
☆54Updated last year
Alternatives and similar repositories for WOLFGPT
Users that are interested in WOLFGPT are comparing it to the libraries listed below
Sorting:
- Clipboard poisoning attack.☆58Updated 5 years ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆160Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆90Updated 5 months ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆178Updated last year
- A tool for automatically change the Tor IP address over time.☆99Updated 6 months ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆90Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆202Updated 6 months ago
- control windows computeur from telegram☆68Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- A social engineering toolkit for performing smishing, and other sms attacks☆100Updated last year
- Rogue access point tool.☆59Updated 3 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆187Updated 4 months ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆50Updated 2 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆188Updated 5 months ago
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆118Updated 2 years ago
- PrivacyNet: Privacy Network☆50Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- A custom Google search (to bypass some limitations on google and VPNs)☆113Updated 2 years ago
- This is power full BotNet☆40Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆51Updated last year
- A social engineering tool designed to seamlessly locate profiles using usernames while offering convenient reverse image search functiona…☆116Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆53Updated last week
- Automated exploit scanner for cameras on the internet☆205Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Updated last year
- Information Gathering Simplified.☆72Updated 2 years ago
- Nmap & SQL injection automation tool☆37Updated last year