🌐 Devploit v 2.3 Information Gathering Tool🕵️
☆17Apr 28, 2018Updated 7 years ago
Alternatives and similar repositories for Devploit-
Users that are interested in Devploit- are comparing it to the libraries listed below
Sorting:
- 🔐instaForce - Instagram Password Attack 🔓☆29Feb 20, 2020Updated 6 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- 💻 GitClin V1.0 for downloading and installing tools☆15Mar 30, 2018Updated 7 years ago
- 🕵️ exploit3r - Joomla Auto Config Donwload☆47Apr 30, 2018Updated 7 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆25Jun 16, 2018Updated 7 years ago
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- Find data about you or an individual from various online public records☆30May 26, 2017Updated 8 years ago
- Facebook Brute Forcer in shellscript using TOR☆34Mar 26, 2018Updated 7 years ago
- 💀 Subdomain - Searching Subdomain Of the site☆33Apr 30, 2018Updated 7 years ago
- Sahabat ZK1☆11Oct 27, 2019Updated 6 years ago
- Material design file manager for Android☆10Jul 4, 2018Updated 7 years ago
- Efficiently manage and track your job application history☆13May 1, 2025Updated 10 months ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.☆46Apr 14, 2018Updated 7 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- A Vulnerablity Radar That Runs With GIthub Actions☆44Updated this week
- Simple web based Messaging app built with Nodejs.☆16Feb 1, 2023Updated 3 years ago
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆28Jan 30, 2026Updated last month
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- RSA cracking algorithm based on Pollard factorization (Pollard's p-1 method).☆15Jun 28, 2023Updated 2 years ago
- Clickme is a powerful multi-step clickjacking tool designed for security professionals. Create, visualize, and demonstrate complex clickj…☆14Sep 4, 2025Updated 6 months ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- 🧩 Downloads crx files of Chrome extensions☆10Apr 7, 2018Updated 7 years ago
- ☆10May 29, 2023Updated 2 years ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- A passive network discovery tool that finds live network nodes by analyzing ARP and broadcast packets.☆14Dec 11, 2012Updated 13 years ago