ind3p3nd3nt / CCFinderLinks
Recursive Credit Card Searcher For Windows C++ and Linux
☆11Updated 3 years ago
Alternatives and similar repositories for CCFinder
Users that are interested in CCFinder are comparing it to the libraries listed below
Sorting:
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Password Recovery Toolkit For Windows Written in Python 3☆26Updated last year
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- simple script to pwn android phone with physical access☆25Updated 6 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Payload delivery via URL and some social engineering.☆17Updated 10 months ago
- Disposable Mails From Command Line☆32Updated 5 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 3 years ago
- chrome keylogger extension !!!☆18Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- python remote access trojan☆35Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- A very powerful tool for All kind of MITM attacks☆14Updated last year
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆22Updated 7 years ago
- Random scripts I write to automate non-hacking stuff☆23Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆18Updated 6 years ago
- A host-based IDS and network monitoring system (My graduation project)☆19Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Updated 6 years ago
- A simple site cloner☆26Updated 7 years ago