My most advanced framework yet!!
☆39May 16, 2023Updated 2 years ago
Alternatives and similar repositories for Trity-1
Users that are interested in Trity-1 are comparing it to the libraries listed below
Sorting:
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- ☆10Oct 8, 2018Updated 7 years ago
- Install Metasploit Framework 6 in Termux☆11Nov 28, 2020Updated 5 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Disposable Mails From Command Line☆33Feb 20, 2020Updated 6 years ago
- instagram için takipçi ve beğeni paneli☆10Feb 17, 2019Updated 7 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- A command line interface providing helpful AWS tools☆10Aug 3, 2021Updated 4 years ago
- This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)☆77Oct 1, 2020Updated 5 years ago
- Instagram Kit Using PHP [Login + Checker + Brute Force + Turbo + Scanner Emails(taken or no)]☆37Sep 12, 2017Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- AFOS Package Manager☆10May 2, 2021Updated 4 years ago
- ☆20Aug 16, 2019Updated 6 years ago
- NUI helm chart to deploy on K8s☆15Nov 19, 2025Updated 3 months ago
- Inventory Management App that allows a store to keep track of its inventory.☆11Dec 5, 2018Updated 7 years ago
- Arduino laptimer for go kart☆10Aug 30, 2021Updated 4 years ago
- Code for the paper "CBVLM: Training-free Explainable Concept-based Large Vision Language Models for Medical Image Classification", Comput…☆17Nov 24, 2025Updated 3 months ago
- Arduino code and board schematics to generate dtmf tones and transmit on a phone line☆14Jul 27, 2009Updated 16 years ago
- An all-in-one WiFi pentesting tool designed to automate and simplify WiFi security auditing and attacks — phishing, SSID spam, DoS, and m…☆34Jun 24, 2025Updated 8 months ago
- ☆14May 14, 2022Updated 3 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- Python wireless library for Linux.☆44Jun 16, 2022Updated 3 years ago
- A multifunctional Android RAT with GUI based Web Panel without port forwarding.☆11Dec 18, 2022Updated 3 years ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆30Dec 19, 2025Updated 2 months ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- DTMFDuino receives DTMF tones through a MT8870 integrated circuit who converts the analog audio of tones to a binary code understandable …☆17Jan 31, 2013Updated 13 years ago
- Amazon S3-compatible storage backend for openBalena☆14Feb 24, 2026Updated 2 weeks ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Rubber Ducky Information Gathering Payload☆10Oct 26, 2018Updated 7 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- ☆13Dec 31, 2020Updated 5 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago