Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.
☆22Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for iris
Users that are interested in iris are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆24Jun 3, 2020Updated 5 years ago
- thelinuxchoice/blackeye☆12Jul 26, 2020Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆13Oct 26, 2018Updated 7 years ago
- Cve and Exploit Finder on the target☆26May 8, 2022Updated 3 years ago
- Scripts to automate Open Source Intelligence (OSINT)☆15Mar 27, 2019Updated 7 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- Simple tool which checks username/email password combinations.☆18May 23, 2021Updated 4 years ago
- ☆12Nov 13, 2019Updated 6 years ago
- Analyze Android APK files from a browser.☆14Sep 29, 2020Updated 5 years ago
- Blocker Hacks☆15Apr 8, 2022Updated 4 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- [NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V3☆45Feb 21, 2023Updated 3 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Password Attack Toolkit☆16Nov 1, 2018Updated 7 years ago
- Social media hacking: hack any facebook,instagram,twitter, accounts Hello and welcome to this social media hacking in this book we will h…☆149Aug 31, 2022Updated 3 years ago
- Config files for OpenBullet☆12Nov 18, 2019Updated 6 years ago
- Skeleton is a Social Engineering tool attack switcher☆75Aug 1, 2020Updated 5 years ago
- Tools for flipper zero☆16Jan 1, 2023Updated 3 years ago
- ☆18Nov 5, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Shellphish is one of the phishing methods that use any website clone to get the victim's details. One of the details examples is the spam…☆14Jul 12, 2021Updated 4 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- Red Team scripts written in python☆17Jul 24, 2022Updated 3 years ago
- Facebook phisher to get password and email of victim.☆30Mar 13, 2018Updated 8 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆15Aug 4, 2019Updated 6 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Mar 19, 2018Updated 8 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Dec 11, 2020Updated 5 years ago
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- Instrument Cluster Simulator☆15Jun 12, 2020Updated 5 years ago
- Automagically configure screen mirroring with xrandr☆30Jun 16, 2021Updated 4 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- remote administrator framework☆21Aug 9, 2024Updated last year
- An open-source, centralized HTTPS botnet☆76Apr 11, 2023Updated 3 years ago