l3m0n / WinPirateLinks
Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords
☆13Updated 9 years ago
Alternatives and similar repositories for WinPirate
Users that are interested in WinPirate are comparing it to the libraries listed below
Sorting:
- Paypal phishing tool☆30Updated 7 years ago
- A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.☆63Updated 9 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆48Updated 2 years ago
- PHP email spoofer | Send emails from any email adress☆82Updated 5 years ago
- Wordlist générator, router flood and Wifi Cracker☆51Updated 5 years ago
- Includes Spoof kit, Phishing Tool Kit, Credit Card Scanner, IP Sniffer, KeyLoggers, Tabnabbing, RansomWare, Viruses, RATS And More . . .☆45Updated 6 years ago
- Skeleton is a Social Engineering tool attack switcher☆71Updated 5 years ago
- Wi-Fi Password Stealer☆60Updated 10 months ago
- Best Google Dorker Available☆37Updated 10 months ago
- This tool will allows u to deauth or kick off an specific device from an given AP☆23Updated 3 years ago
- It has been developed in order to facilitate the use of ready-made Brute Force tools in Kali-Linux operating systems and is written in Py…☆17Updated 4 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆31Updated 7 years ago
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆13Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆24Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Advanced payload generetor and multi handler☆40Updated 4 years ago
- Info and password stealer☆97Updated 8 years ago
- #Just simple program to spoofing device by sending malicious link☆30Updated 3 years ago
- Simple script masks the phishing link under the normal URL☆84Updated 4 years ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆17Updated 4 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆40Updated 3 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- Ro3b - Advance Banking HTTP Botnet☆52Updated 2 years ago
- USE THIS TOOL AGAINST SPAMMERS, THIS TOOL IS SO POWERFULL. ITS MAIN ABILITY IS CALL FLOODING.☆22Updated 4 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆67Updated 4 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆45Updated 8 years ago
- Facebook Hacking Menu☆36Updated 5 years ago
- Hacking Tools☆49Updated 7 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 6 years ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆130Updated 8 years ago