☆43Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for Ciciti
Users that are interested in Ciciti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆53Apr 3, 2024Updated 2 years ago
- ☆54Apr 3, 2024Updated 2 years ago
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- Git & GitHub Cheat sheet.☆13Jul 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- ☆13Sep 30, 2021Updated 4 years ago
- hackathon, hacking-tool, termux-hacking, termux-environment, nitro-friendly☆10Sep 17, 2020Updated 5 years ago
- ☆10Jul 15, 2023Updated 2 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆17Sep 14, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Wi-Fi based covert channel that hides information in hand crafted acknowledgement frames imitating additional channel effects that can be…☆26Apr 1, 2018Updated 8 years ago
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆18May 1, 2021Updated 4 years ago
- Python code to to compute PMKs, PTKs, and MICs given data from a WPA2 4-way handshake☆15Oct 29, 2017Updated 8 years ago
- Accurately Locate Smartphones using Social Engineering☆13Jun 3, 2020Updated 5 years ago
- Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.☆18Nov 2, 2017Updated 8 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- a Netflix Checker made with Selenium☆22Nov 25, 2020Updated 5 years ago
- A Web app that includes all the usefull websites which you might require for your next project☆29Feb 1, 2026Updated 2 months ago
- The tool generates a malicious HTTPS page using Ngrok Port Forwarding method, and a javascript code to perform cam requests using MediaDe…☆29May 16, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Generate and validate United Kingdom national insurance numbers using PHP or JavaScript.☆31Mar 2, 2012Updated 14 years ago
- Use onlinehashcrack.com api with python to crack rar,zip,cap,docx etc.. 20 million+ wordlist and hybrid bruteforce.☆20Mar 17, 2021Updated 5 years ago
- ☆25Oct 2, 2021Updated 4 years ago
- Virus Repository☆28Jan 2, 2022Updated 4 years ago
- I store whatever i learn in this website.☆34Feb 7, 2026Updated 2 months ago
- ABA/routing number validation tools☆41Mar 23, 2012Updated 14 years ago
- Moonbounce is graphical user interface for using an OpenVPN client and server with Pluggable Transport support. The goal of Moonbounce is…☆37Apr 25, 2024Updated last year
- Facebook Hacking Menu☆38Apr 25, 2020Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Use this script to search through locally stored files for any Credit/Debit card details.☆33Nov 24, 2019Updated 6 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆12Oct 26, 2021Updated 4 years ago
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- This project contains the nexmon-based source code required to repeat the experiments of our WiSec 2017 paper.☆65Sep 6, 2017Updated 8 years ago
- Hosted Reverse Shell generator with a ton of functionality (thanks 0day!)☆42Sep 24, 2024Updated last year
- Wireless EMP (WEMP) - A simple shell script that kicks all devices off of a network for as long as desired☆35Feb 1, 2017Updated 9 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago