☆23Jan 1, 2018Updated 8 years ago
Alternatives and similar repositories for Wifite-2
Users that are interested in Wifite-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- WPA cracking tool for Android☆10Jul 17, 2020Updated 5 years ago
- Ananicy - Auto-nice daemon with crowdsourced ruleset☆11Sep 24, 2024Updated last year
- All combinations of various characters, to get the desired word☆21Dec 13, 2023Updated 2 years ago
- ☆20Mar 18, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Get 10k subdomains in securitytrails using cookie without apikey.☆39Oct 23, 2025Updated 5 months ago
- ☆10Aug 21, 2024Updated last year
- D3DQuake is id Software's Quake modified to use Direct3D 7.0.☆10Aug 23, 2014Updated 11 years ago
- EmoKill is an Emotet process detection and killing tool for Windows OS. It avoids wasting time after detection of Emotet. Any process t…☆13Dec 8, 2022Updated 3 years ago
- BleachBit documentation☆12Mar 19, 2026Updated last month
- Framework for Making Environmental Keyed Payloads☆13Nov 1, 2016Updated 9 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 6 years ago
- A multi-page Guide to create a Multiboot-USB-Stick for IT-Technicians that use Boot CDs on a daily basis.☆16Jun 11, 2018Updated 7 years ago
- Code Search on Fess☆11Nov 2, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11Mar 5, 2020Updated 6 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- i2p router implementation in C11☆11Nov 14, 2017Updated 8 years ago
- Bitcoin miner by Raphael Frajuca(Badguy5552)☆11Oct 10, 2017Updated 8 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Integrated Windows Authentication in Java☆12Mar 21, 2026Updated 3 weeks ago
- Simple script to test for clickjacking☆23Jun 21, 2021Updated 4 years ago
- The Choice TheChoice is a collection of 14 hacker tools from @thelinuxchoice Installation : $ apt update && apt upgrade $ apt install git…☆17Dec 31, 2020Updated 5 years ago
- Simple ClamAV win32 UI☆21Mar 14, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Tired of paying a subscription service to access an API to resolve geoIP data? Look no further! Resolving locally and maintaining your ow…☆15Jan 15, 2025Updated last year
- Automatically exported from code.google.com/p/mobilewebcam-android☆14May 30, 2015Updated 10 years ago
- Metasploit Framework auto installer for termux 2023 - NO errors☆21Oct 3, 2024Updated last year
- Add-on Compatibility Reporter (Redux)☆17Mar 28, 2019Updated 7 years ago
- Telegram TDLib via C-Sharp☆14Jun 18, 2018Updated 7 years ago
- Archive of leaked Equation Group materials☆15Aug 17, 2016Updated 9 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Tor Browser Portable is a portablized version of the Tor Browser, which allows for truly anonymous browsing.☆11Oct 22, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆22Aug 18, 2018Updated 7 years ago
- Unofficial list of approved tools for OSCP☆28Apr 25, 2023Updated 2 years ago
- Android app for DoS attack☆13Apr 2, 2020Updated 6 years ago
- ## Install Follow The Steps Below! ```bash > termux-setup-storage (after that tap on permission) > pkg update -y > pkg upgrade -y > pkg …☆37May 4, 2021Updated 4 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- ☆10May 25, 2023Updated 2 years ago
- Sentry without the MBA, credential stuffing and brute-force attack tool with many features☆26Dec 22, 2017Updated 8 years ago