joel-g / DefenseDistributed_DEFCAD_Firearm_FilesLinks
☆19Updated 7 years ago
Alternatives and similar repositories for DefenseDistributed_DEFCAD_Firearm_Files
Users that are interested in DefenseDistributed_DEFCAD_Firearm_Files are comparing it to the libraries listed below
Sorting:
- The Latest AR-15 Lowers and the Liberator☆20Updated 12 years ago
- My Counter-Censorship☆79Updated 12 years ago
- 3d printed guns repository from sources across the internet☆129Updated 5 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19Updated 5 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆12Updated 7 years ago
- Kali Linux Bugs & Problems Automatic Fix Script☆12Updated 8 years ago
- Mac based platform with AR FCG☆18Updated 2 years ago
- A complete package of all Deterrence Dispensed public releases in one convinient file.☆17Updated 4 years ago
- ☆15Updated 3 years ago
- 'mispitools' is an open-source package written in the R statistical language. It consists of a collection of decision-making tools design…☆38Updated last week
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Updated 4 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- HID payloads for good purpose☆10Updated last year
- Official Defcad Megapack Repo☆196Updated 12 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Updated 4 years ago
- CameraDar hacks its way into RTSP CCTV cameras.☆11Updated 8 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Updated 3 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆22Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 5 years ago
- Anubis 7.0☆27Updated last year
- This is a simple tool for openbullet configs☆23Updated 4 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12Updated 6 years ago
- create fully undetectable payload☆17Updated 2 years ago
- Sponsored By Mr ROBOT☆14Updated 5 years ago
- From country name, Network /Service and location☆11Updated last year
- RfCat - swiss-army knife of ISM band radio☆24Updated 3 years ago
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆20Updated 4 years ago
- Really useful hacking tools.☆19Updated 2 years ago