Collection Of LolSec
☆37May 12, 2019Updated 6 years ago
Alternatives and similar repositories for LolSec
Users that are interested in LolSec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆127Jan 5, 2024Updated 2 years ago
- Work In progress to capture all sorts of data transaction on any Platform supported by Frida.☆11Feb 13, 2026Updated last month
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Alfred is a advanced OSINT information gathering tool☆11Nov 14, 2025Updated 4 months ago
- Stealth Kid RAT (SKR) is an open-source multi-platform Remote Access Trojan (RAT) written in C#. Released under MIT license. The SKR proj…☆24Sep 16, 2021Updated 4 years ago
- This tool provides detailed analysis of changes between iOS firmware versions and their potential impact on device functionality.☆13Nov 4, 2024Updated last year
- Powerful, unbearable DDoS Tool☆12Feb 7, 2021Updated 5 years ago
- A tool to check the correctness of email and password☆21Feb 26, 2024Updated 2 years ago
- Dark Reader Chrome and Firefox extension☆12Jul 7, 2019Updated 6 years ago
- Restores firmware and filesystem to iPhone/iPod Touch☆11Jun 7, 2010Updated 15 years ago
- A tool that can used for hacking :- reverse-shells, email-attacks, ip tracker and tracer.☆10Aug 3, 2022Updated 3 years ago
- ☆11May 6, 2024Updated last year
- An Xposed Module which can recognize, parse verification code and copy it to clipboard when a new message arrives . / 识别短信验证码的Xposed模块,并…☆10Jan 5, 2019Updated 7 years ago
- Amazon Email and Phone Number Validator !☆25Mar 2, 2025Updated last year
- A lightweight record-replay reverse proxy for testing☆21Feb 20, 2026Updated last month
- Patch boot with Magisk/kernelSU/APatch on windows☆17Apr 9, 2024Updated last year
- Script darkfb v1.9 (login akses token).☆10Mar 4, 2023Updated 3 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- Listing UDP connections with remote address without sniffing.☆31Sep 26, 2023Updated 2 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 6 years ago
- A simple stock market data analysis using Yahoo Finance and Plotly.☆10Dec 13, 2021Updated 4 years ago
- Script to Debloat Android Apps - No ROOT/Unlocked Bootloader Required!☆13Dec 25, 2021Updated 4 years ago
- NSA Hacking Tool Recreation UnitedRake☆13Jul 11, 2019Updated 6 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- combo lists for dev testing☆11Jan 15, 2019Updated 7 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Detect virtual environment☆67Apr 25, 2019Updated 6 years ago
- Make Your Passwords Cracking easier! Crack any kinda pwds within just few minutes!!☆19Oct 26, 2020Updated 5 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Feb 19, 2021Updated 5 years ago
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆19Feb 19, 2026Updated last month
- ☆19Jul 25, 2025Updated 7 months ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 9 months ago
- 👾- An open-source post-exploitation framework, researchers and developers.☆56Jul 29, 2023Updated 2 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year