☆50Sep 26, 2025Updated 6 months ago
Alternatives and similar repositories for BTSTORM
Users that are interested in BTSTORM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Aug 6, 2025Updated 7 months ago
- ☆30May 29, 2025Updated 9 months ago
- ☆33Oct 3, 2025Updated 5 months ago
- ☆77Mar 8, 2026Updated 2 weeks ago
- ☆44Jun 28, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆25Apr 21, 2025Updated 11 months ago
- ☆66Mar 9, 2026Updated 2 weeks ago
- ☆27Nov 13, 2025Updated 4 months ago
- ☆339Updated this week
- ☆68Aug 11, 2025Updated 7 months ago
- An effective tool for hacking starlink wifi password.☆20Apr 12, 2025Updated 11 months ago
- Re-upload of https://github.com/loxy0dev/RedTiger-Tools☆32Nov 8, 2025Updated 4 months ago
- DEDSEC-VPN is a Linux-based VPN tool that hides your real IP and blocks IPv6 leaks.☆32Feb 21, 2026Updated last month
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- WormGPT CLI: Chaos engine for testing LLM workflows.☆40Aug 8, 2025Updated 7 months ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆27Sep 28, 2025Updated 5 months ago
- Bootstra AI Jailbreak for iOS: The World’s First AI-Powered Jailbreaking Tool☆27Jan 13, 2026Updated 2 months ago
- Bluetooth speaker killer☆34Jun 1, 2024Updated last year
- SMS flooding tool☆23May 3, 2025Updated 10 months ago
- FB-PHISH is a phishing tool of FACEBOOK intented only that will work perfectly.☆10Dec 14, 2023Updated 2 years ago
- Concurrency-optimized custom password cracker in python☆12Dec 14, 2015Updated 10 years ago
- Tool-X is an advanced, centralized CLI framework designed to automate the installation and management of 1000+ hacking, OSINT, and securi…☆34Mar 20, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- DES Encrypter/Decrypter☆20Feb 12, 2017Updated 9 years ago
- WiFi Hacking Suite☆38Mar 19, 2026Updated last week
- HackRF Sweep Spectrum Analyzer☆13Apr 21, 2025Updated 11 months ago
- Spoof the email and spams a persons inbox!☆13Jun 24, 2022Updated 3 years ago
- Windows based version of the popular app Ls Droid used for flashing the 99-07 General Motors V8 Engine Computers☆11Jan 31, 2021Updated 5 years ago
- SDR-TRX is an experimental low-cost digital mode ham radio HF transceiver.☆13Jan 6, 2025Updated last year
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- This DuckyScript, created by ooovenenoso, automates the removal of problematic CrowdStrike files causing BSOD on Windows. The script open…☆11Jul 23, 2024Updated last year
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- Convert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custo…☆39May 11, 2025Updated 10 months ago
- BEERUS Framework for Android☆608Mar 17, 2026Updated last week
- DoS Attacks on Bluetooth Devices for pentest purposes☆33Nov 22, 2025Updated 4 months ago
- Simple mock/proxy servers for FCM and APNs☆13Oct 8, 2018Updated 7 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago