maximousblk / callow
Dead simple brute force tool for website login forms
☆84Updated 9 months ago
Alternatives and similar repositories for callow:
Users that are interested in callow are comparing it to the libraries listed below
- Simple script masks the phishing link under the normal URL☆83Updated 4 years ago
- SMS/Email/whatsapp Bombers Collection.☆33Updated 4 years ago
- Active reconaissance, information gathering and OSINT built in a portable web application test.☆41Updated 11 months ago
- PhishX - The Complete Spear Phishing Tool☆104Updated 6 years ago
- FRAMEWORK REVOLTSHING v.2 . HTTP SERVER FOR PHISHING☆69Updated 7 months ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆47Updated 5 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 5 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆78Updated 3 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆74Updated last month
- Bruteforce script to bruteforce Login authentication pages. ( made for ctf )☆73Updated 4 months ago
- Hatch is a brute force tool that is used to brute force most websites☆77Updated 11 months ago
- bring shell grabber a python bot which grab shells easily just by entering site list and it search for vulnerabilities as well as exploit…☆41Updated 3 years ago
- Send anonymous text messages with TOR and the TextBelt API☆64Updated 3 years ago
- [NEW] : Mega Bot ☣ Scanner & Auto Exploiter☆125Updated 4 years ago
- An OSINT tool to find user's all over the internet including social media platforms☆90Updated last year
- There are three ways to create an email bomb Mass mailing☆64Updated 3 years ago
- Backdoor Generator | Linux & Windows | FUD AV .py .exe☆107Updated 4 years ago
- Information Gathering - API hackertarget.com☆46Updated 4 years ago
- Facebook Brute Forcer in shellscript using TOR☆31Updated 6 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆58Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆61Updated 4 years ago
- this FUD Payload☆40Updated 3 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 2 years ago
- Finder Web Site Admin Login Page☆60Updated 3 years ago
- Best social media phishing☆23Updated 4 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆103Updated 3 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆64Updated 3 years ago
- PHP email spoofer | Send emails from any email adress☆78Updated 4 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Python Script to help/automate the WiFi hacking exercises.☆85Updated 3 years ago