sobri3195 / PegaboxLinks
A collection of Windows, Website and Wifi pentesting scripts and exploits.
☆16Updated 4 years ago
Alternatives and similar repositories for Pegabox
Users that are interested in Pegabox are comparing it to the libraries listed below
Sorting:
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- detect trojans in an easy way 🛡️☆29Updated 7 years ago
- WP Grab Info v2☆74Updated 7 years ago
- DES Encrypter/Decrypter☆19Updated 8 years ago
- script to brute force ssh or ftp passwords☆12Updated 9 years ago
- Hacking Website with SQL injection☆14Updated 5 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆28Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆110Updated 7 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆28Updated 7 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- Identify connection of sessions for social engineering attacks.☆57Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- website admin panel finder☆35Updated 4 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆74Updated 6 years ago
- Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so p…☆16Updated 6 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆76Updated 3 years ago
- A simple phishing tool that can phish almost any website☆76Updated 7 years ago
- Simple Webshell Scanner☆54Updated 10 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆19Updated 6 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- Gmail phishing page sample☆69Updated 5 years ago
- A Directory Bruteforcing Tool That Makes Your Life Easier!☆17Updated 2 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆34Updated 4 years ago
- Devploit v 1.1 Information Gathering Tool☆33Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆57Updated 8 years ago
- 🚀 Dzjecter V2.0 Server checking Tool☆58Updated 7 years ago
- Telegram Bot (Initial Development)☆104Updated 2 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Working on a small SQL Injection framework☆17Updated 3 months ago