imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution
☆77Apr 26, 2019Updated 7 years ago
Alternatives and similar repositories for imR0T
Users that are interested in imR0T are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆38Dec 18, 2016Updated 9 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆13Jan 24, 2021Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆146Jan 26, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆752Sep 1, 2022Updated 3 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆381Apr 13, 2017Updated 9 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,334Jan 23, 2018Updated 8 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆32Nov 4, 2018Updated 7 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,257Mar 9, 2020Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Apr 13, 2019Updated 7 years ago
- Get clients and access points.☆49Aug 28, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 8 months ago
- Artificial ignorance☆23Jan 26, 2013Updated 13 years ago
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 6 months ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Web Vulnerability Scanner using Shell Script☆60Jun 29, 2022Updated 3 years ago
- Easy way to brute-force web directory.☆163Jun 2, 2019Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- VESvault End-to-End Encryption API: Encrypt Everything Without Fear of Losing the Key☆39Dec 11, 2024Updated last year
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago