petercunha / BitBuster
Multi-threaded Instagram account cracker
☆17Updated 7 years ago
Related projects: ⓘ
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆13Updated 5 years ago
- Know the dangers of credential reuse attacks.☆7Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- [BASH] Password generator through a wordlist☆12Updated 11 years ago
- 🌐 "Net" — A collection of bot-nets and bot-net supplies for DOCUMENTING and ARCHIVING purposes ONLY!☆16Updated 3 years ago
- A selenium driven tool to check if you can login to a given account☆11Updated 5 years ago
- ☆16Updated this week
- DES Encrypter/Decrypter☆15Updated 7 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆10Updated 5 years ago
- ☆18Updated this week
- its Email Extractor its non stoply extracting email from website...☆13Updated 3 years ago
- ☆15Updated this week
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- ☆10Updated this week
- Scan a URL against a list of dorks to check for vulnerabilities.☆10Updated 7 years ago
- ☆20Updated this week
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Updated 6 years ago
- Quick and simple alghorithm to search in leaks very fast mode☆11Updated 5 years ago
- ☆12Updated 2 years ago
- pen testing scripts☆9Updated 3 years ago
- An advance keylogger that works and also logs special keys.☆17Updated 2 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆21Updated 6 years ago
- CNC botnet developed via C☆15Updated 7 years ago
- steal password mozilla firefox ,windows,Linux☆12Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 3 years ago
- ☆10Updated this week
- ☆17Updated this week
- A software having all stuff related to proxy☆8Updated last year
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆36Updated 4 years ago