quantumcore / irisLinks
Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.
☆23Updated 5 years ago
Alternatives and similar repositories for iris
Users that are interested in iris are comparing it to the libraries listed below
Sorting:
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 5 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 5 years ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Updated 3 years ago
- Keylogger for ethical hackers☆13Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- Facebook phisher to get password and email of victim.☆28Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆85Updated 9 months ago
- emailosint is a tool for gathering email accounts informations (ip,hostname,country, etc...)☆23Updated 4 years ago
- Anubis 7.0☆27Updated last year
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆39Updated 3 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆28Updated 7 years ago
- Android Hacking Over Wan☆22Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- remote administrator framework☆22Updated last year
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 6 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 3 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆34Updated 5 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Updated 9 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Updated 3 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆38Updated 4 years ago
- A single tool to bruteforce pdf , zip and hashes very super fast tool developed with python3☆49Updated 2 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- People Profiler (fake script)☆24Updated last year
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆20Updated last year