ind3p3nd3nt / CCFinderLinks
Recursive Credit Card Searcher For Windows C++ and Linux
☆12Updated 3 years ago
Alternatives and similar repositories for CCFinder
Users that are interested in CCFinder are comparing it to the libraries listed below
Sorting:
- simple script to pwn android phone with physical access☆25Updated 6 years ago
- pen testing scripts☆12Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 3 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 6 years ago
- Disposable Mails From Command Line☆32Updated 5 years ago
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆26Updated 6 years ago
- A simple site cloner☆26Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆14Updated 6 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆14Updated 3 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 4 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆36Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- ☆13Updated 4 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆22Updated 7 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆33Updated 7 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- steal password mozilla firefox ,windows,Linux☆12Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Complete and modifyable ransomware program☆11Updated 4 years ago