Manipulate Chromecast Devices in your Network
☆259Jul 7, 2020Updated 5 years ago
Alternatives and similar repositories for killcast
Users that are interested in killcast are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploitation Framework for ATtiny85 Based HID Attacks☆360May 20, 2020Updated 5 years ago
- Apache Tomcat Manager API WAR Shell Upload☆36Jul 9, 2020Updated 5 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,547Mar 28, 2026Updated last month
- USB-Rubber-Ducky-Arduino-New-Payloads☆14Oct 26, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All In One Web Recon☆2,721Apr 30, 2025Updated last year
- Multi-Mail-Sender☆10Dec 1, 2020Updated 5 years ago
- Accurately Locate Smartphones using Social Engineering☆9,308May 7, 2025Updated 11 months ago
- ☆14Jan 24, 2023Updated 3 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- OSINT tool for finding profiles by username☆2,515Sep 30, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Jun 24, 2023Updated 2 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆30Feb 22, 2018Updated 8 years ago
- Heimdall theme inspired from Microtech Hydra UI shown in Cyberpunk 2077☆16Aug 10, 2025Updated 8 months ago
- MiFare Classic Universal toolKit (MFCUK)☆12May 15, 2016Updated 9 years ago
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆31Mar 7, 2019Updated 7 years ago
- The ChromeCast Exploitation Kit☆37Sep 2, 2023Updated 2 years ago
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Apr 24, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Plugin for Recaf, which allows you to no-op methods with a single click.☆16May 22, 2021Updated 4 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- Exposing Xfinity's backdoor - Utilizing Headless browser exploit.☆21Nov 23, 2016Updated 9 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- SWB - it is new generation command tool to bruteforce WiFi networks via android device. ROOT Required!☆29Sep 26, 2023Updated 2 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- ☆21Aug 16, 2019Updated 6 years ago
- Instagram Password Cracker☆10Nov 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 4 years ago
- Long range radio communication system using LoRa☆13Feb 1, 2021Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- bind your malware or reverse shell into any file (jpg - jpeg - txt - mp4 or any format ;) )☆11Mar 26, 2019Updated 7 years ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Sep 20, 2021Updated 4 years ago
- Python script for exploiting command injection in Open PLC Webserver v3☆21Jul 12, 2024Updated last year
- a hash query tool☆36Feb 12, 2019Updated 7 years ago