k3170makan / GooDork3-dev
The shards of code that will soon become the next GooDork version
☆17Updated 12 years ago
Alternatives and similar repositories for GooDork3-dev:
Users that are interested in GooDork3-dev are comparing it to the libraries listed below
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆12Updated 7 years ago
- ☆9Updated 8 years ago
- ☆17Updated 3 years ago
- Search without being tracked-(Your Own Private Search Engine )☆17Updated 3 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- Show info about the author by facebook photo url☆39Updated 7 years ago
- A facebook profile and reconnaissance system☆56Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- GSM Sniffer☆34Updated 13 years ago
- log file scrubber☆16Updated 6 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Updated 7 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- misc scripts☆21Updated this week
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- Python tool to check the HTTP response code for a list of websites☆21Updated 3 years ago
- Distributed WPA/WPA2 cracker☆15Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 4 months ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- A repository for personal tracking.☆15Updated 2 years ago
- Generate word list by combining inputted words or by permutaing characters.☆13Updated 7 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Wordpress AFD dl-skin.php Exploit☆15Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago