☆43Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for Ciciti
Users that are interested in Ciciti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆53Apr 3, 2024Updated 2 years ago
- ☆54Apr 3, 2024Updated 2 years ago
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- ☆15Sep 30, 2021Updated 4 years ago
- My personal website - Built using Angular and Tailwind CSS☆24Jun 30, 2024Updated last year
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆18Sep 14, 2020Updated 5 years ago
- Wi-Fi based covert channel that hides information in hand crafted acknowledgement frames imitating additional channel effects that can be…☆27Apr 1, 2018Updated 8 years ago
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆19May 1, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python code to to compute PMKs, PTKs, and MICs given data from a WPA2 4-way handshake☆15Oct 29, 2017Updated 8 years ago
- Accurately Locate Smartphones using Social Engineering☆14Jun 3, 2020Updated 5 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- a Netflix Checker made with Selenium☆22Nov 25, 2020Updated 5 years ago
- The tool generates a malicious HTTPS page using Ngrok Port Forwarding method, and a javascript code to perform cam requests using MediaDe…☆29May 16, 2020Updated 5 years ago
- Generate and validate United Kingdom national insurance numbers using PHP or JavaScript.☆31Mar 2, 2012Updated 14 years ago
- Use onlinehashcrack.com api with python to crack rar,zip,cap,docx etc.. 20 million+ wordlist and hybrid bruteforce.☆18Mar 17, 2021Updated 5 years ago
- ☆25Oct 2, 2021Updated 4 years ago
- Virus Repository☆29Jan 2, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ABA/routing number validation tools☆41Mar 23, 2012Updated 14 years ago
- Facebook Hacking Menu☆39Apr 25, 2020Updated 6 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆12Oct 26, 2021Updated 4 years ago
- Facebook bot dumper&scraper☆41Oct 13, 2024Updated last year
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- A well-designed, interesting game where a user can play with their favourite edible and click it to get the highest score.☆30Dec 19, 2024Updated last year
- Hosted Reverse Shell generator with a ton of functionality (thanks 0day!)☆42Sep 24, 2024Updated last year
- Wireless EMP (WEMP) - A simple shell script that kicks all devices off of a network for as long as desired☆35Feb 1, 2017Updated 9 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generate and validate Canadian social insurance numbers using PHP.☆54Aug 2, 2024Updated last year
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Feb 18, 2015Updated 11 years ago
- ☆39Mar 5, 2024Updated 2 years ago
- WiFi Pineapple MK7 Community Packages☆56Aug 8, 2022Updated 3 years ago
- RDPTown: Get your own free Linux RDP or virtual computer on Google Cloud, with just a Google account!☆60May 14, 2025Updated 11 months ago
- Herramienta ideal para automatizar ataques WiFi (WEP & WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆60Sep 14, 2021Updated 4 years ago
- IP and geolocation tracking tool☆62Oct 3, 2024Updated last year