Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.
☆23Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for iris
Users that are interested in iris are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆25Jun 3, 2020Updated 5 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 2 months ago
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Oct 26, 2018Updated 7 years ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- Scripts to automate Open Source Intelligence (OSINT)☆15Mar 27, 2019Updated 7 years ago
- For accessing info of both public and private instagram accounts☆19Aug 29, 2022Updated 3 years ago
- ☆12Nov 13, 2019Updated 6 years ago
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- Blocker Hacks☆15Apr 8, 2022Updated 4 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- [NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V3☆45Feb 21, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Social media hacking: hack any facebook,instagram,twitter, accounts Hello and welcome to this social media hacking in this book we will h…☆149Aug 31, 2022Updated 3 years ago
- Skeleton is a Social Engineering tool attack switcher☆75Aug 1, 2020Updated 5 years ago
- Tools for flipper zero☆16Jan 1, 2023Updated 3 years ago
- A program which allow you to send SMS with sender ID. Provide your API Key & Messaging Profile ID, click refresh & then you should be abl…☆15Apr 9, 2022Updated 4 years ago
- A simple python tool to reverse search whois by name and email from free services☆19May 5, 2020Updated 5 years ago
- Instagram-Py Instagram-py performs slick brute force attack on Instagram without any type of password limiting and also resumes your atta…☆11Dec 4, 2021Updated 4 years ago
- ☆18Nov 5, 2022Updated 3 years ago
- Shellphish is one of the phishing methods that use any website clone to get the victim's details. One of the details examples is the spam…☆14Jul 12, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- Small social engineering tool written in python2☆20Nov 7, 2024Updated last year
- Red Team scripts written in python☆17Jul 24, 2022Updated 3 years ago
- Custom animations for the flipper-zero Made by Phoenix_YYZ☆17Dec 24, 2022Updated 3 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- Facebook phisher to get password and email of victim.☆29Mar 13, 2018Updated 8 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 8 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Feb 8, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Dec 11, 2020Updated 5 years ago
- Instrument Cluster Simulator☆14Jun 12, 2020Updated 5 years ago
- Kali Linux Bugs & Problems Automatic Fix Script☆12Sep 14, 2017Updated 8 years ago
- Automagically configure screen mirroring with xrandr☆30Jun 16, 2021Updated 4 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- remote administrator framework☆22Aug 9, 2024Updated last year