ianwolf99 / WOLFGPTLinks
A computer programming AI bot in python django
☆51Updated last year
Alternatives and similar repositories for WOLFGPT
Users that are interested in WOLFGPT are comparing it to the libraries listed below
Sorting:
- Clipboard poisoning attack.☆58Updated 5 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆71Updated last year
- Dogma V1.5.3☆29Updated 5 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆148Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆82Updated 2 months ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆170Updated last year
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆126Updated last month
- Information Gathering Simplified.☆67Updated 2 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- Nmap & SQL injection automation tool☆35Updated 9 months ago
- Rogue access point tool.☆59Updated 3 years ago
- A social engineering toolkit for performing smishing, and other sms attacks☆89Updated last year
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆88Updated 9 months ago
- FHook is a Command and Control server which allows an individual to accept connections from multiple remote clients via a remote access t…☆14Updated 2 years ago
- control windows computeur from telegram☆68Updated last year
- Full Valid Fake Data Generator☆99Updated 9 months ago
- This is power full BotNet☆41Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆42Updated 9 months ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆48Updated 2 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆23Updated 2 months ago
- It is an automated phishing tool that includes more than 30 phishing templates.☆85Updated 8 months ago
- A tool for automatically change the Tor IP address over time.☆92Updated 3 months ago
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆14Updated 10 months ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆62Updated 4 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆17Updated 2 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆187Updated 2 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆77Updated last year