rewanthtammana / Hack-KitLinks
Automatically converts your firefox browser into a hacking tool by installing required plugins.
☆12Updated 8 years ago
Alternatives and similar repositories for Hack-Kit
Users that are interested in Hack-Kit are comparing it to the libraries listed below
Sorting:
- Fast exploitation based on metasploit.☆74Updated 5 years ago
 - Generate Malicious QR or similar☆16Updated 2 years ago
 - !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to …☆46Updated 3 years ago
 - Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 11 months ago
 - Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated 2 years ago
 - An Automated Database Hacking Software with Database Dorks Hacking☆31Updated 6 years ago
 - 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 5 years ago
 - Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated 2 years ago
 - Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆59Updated 2 years ago
 - A OSINT tool to obtain a target's phone number just by having his email address☆31Updated 6 years ago
 - Automatically clone websites and patch them with PHP to create phishing pages☆61Updated 5 months ago
 - Search .git folders for emails and URL's that should otherwise be hidden☆34Updated 4 years ago
 - Keylogger for ethical hackers☆13Updated 4 years ago
 - #Just simple program to spoofing device by sending malicious link☆29Updated 3 years ago
 - Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago
 - Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
 - Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
 - holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆40Updated 4 years ago
 - Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
 - Keylogger using pynput + mail sender☆54Updated 5 years ago
 - Ded Security Framework is a tool aimed at security professionals☆36Updated last year
 - A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
 - Clipboard poisoning attack.☆58Updated 5 years ago
 - Fully Undetectable telegram Rat dropper☆37Updated 4 years ago
 - An extreme encryption for everyone, encrypt your text before sending to anyone. Alphabets and numbers are going to be encrypted like a he…☆14Updated last year
 - ReconHound is Best OSINT Tool For Enumeration We've Given 10 Different Type Of Enumeration Sub Tools Its Recon Framework Based On Api☆19Updated last year
 - An OSINT tool to search for accounts by username in social networks.☆20Updated 3 years ago
 - Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 5 years ago
 - Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆149Updated 6 years ago
 - Full Valid Fake Data Generator☆101Updated last year