mkdirlove / BT-CONNECTION-DUMPINGView external linksLinks
Bluetooth spoofing to grab the connection between two paired bluetooth devices.
☆13Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for BT-CONNECTION-DUMPING
Users that are interested in BT-CONNECTION-DUMPING are comparing it to the libraries listed below
Sorting:
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- Fake WiFi Access Point with captive portal☆10May 18, 2025Updated 8 months ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 6 months ago
- Send a spoofed email and receive the IP address of the user who opened it☆15Jun 2, 2020Updated 5 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆19Jan 4, 2021Updated 5 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- This is a simple python script to allow you to generate a lot of Spotify accounts, this version gives you a little bit more customization…☆10Oct 4, 2022Updated 3 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- #Just simple program to spoofing device by sending malicious link☆31Mar 1, 2022Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Disable Windows Defender All Version☆31Jan 5, 2021Updated 5 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- A Network Automation framework focused on Cyber-Security☆46Jul 6, 2023Updated 2 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Credit card generator that can use for free trial and valid but not allow to store money and it's not owned by anyone.☆13Jan 2, 2024Updated 2 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Angular Personal Resume And Portfolio Template☆10Jan 29, 2026Updated 2 weeks ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 3 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 weeks ago
- ☆10Apr 21, 2022Updated 3 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- The lists of words from the spam words api☆10Jul 1, 2021Updated 4 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆11Nov 5, 2020Updated 5 years ago