liushengxian / soup-js
Open source call flooder using Twilio API.
☆20Updated 9 months ago
Alternatives and similar repositories for soup-js:
Users that are interested in soup-js are comparing it to the libraries listed below
- USE THIS TOOL AGAINST SPAMMERS, THIS TOOL IS SO POWERFULL. ITS MAIN ABILITY IS CALL FLOODING.☆22Updated 4 years ago
- The EVIL EMAIL/SMS BOMBER is made for research and testing purposes only. Prank your friends. EVIL EMAIL/SMS BOMBER can send bulk mail …☆45Updated 3 years ago
- A router Sploit is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece o…☆56Updated 3 years ago
- OSINT webcam mapping project☆79Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆47Updated 6 years ago
- The purpose is to flood scam call centers. If you can't already do this manually, this script won't be much use to you.☆9Updated 5 months ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 5 years ago
- Get your USB Rubber Ducky up and running faster☆42Updated 7 years ago
- Xfinity WiFi Honeypot / Credential Harvester☆25Updated 7 years ago
- Track any ip address with IP-Tracer. IP-Tracer is developed for linux and android terminal like Termux and GNURoot Debian. you can retrie…☆24Updated 5 years ago
- WiFi-Jammer/DoS toolset☆61Updated 4 years ago
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆26Updated 3 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 6 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆61Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆77Updated 3 years ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆17Updated 4 years ago
- Fast exploitation based on metasploit.☆73Updated 5 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆18Updated 6 years ago
- BLE Edition of the original FistBump (portable WPA handshake grabber)☆47Updated 6 years ago
- Skeleton is a Social Engineering tool attack switcher☆68Updated 4 years ago
- This module uses the Metasploit framework built into Kali Linux to create a backdoor☆13Updated 4 years ago
- There are three ways to create an email bomb Mass mailing☆65Updated 3 years ago
- This is a hacking tool. This can be used to hack any windows machine without being detected.☆13Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆64Updated 6 years ago
- ☆47Updated last year
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆79Updated 3 years ago
- Port Forwarding NetStat Grab wpa_supplicant Turn WiFi On/Off Show Mac/Inet Remove Password Extract apk from app Use Keycode Get Battery…☆23Updated 4 years ago
- tools, mallware; phishing, botnet, database , courses ..☆71Updated 3 years ago