tokyoneon / ArcaneLinks
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.
☆156Updated 5 years ago
Alternatives and similar repositories for Arcane
Users that are interested in Arcane are comparing it to the libraries listed below
Sorting:
- Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video☆129Updated last year
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- A Framework meant for the exploitation of iOS devices.☆226Updated 4 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆142Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- BEST HACKING TOOLS..For more tools visit our blog for Hackers☆142Updated 3 months ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- AppleID Bruteforce☆139Updated 4 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆65Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆111Updated 7 years ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆146Updated 6 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆198Updated 2 years ago
- This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on thei…☆26Updated last year
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- ☆46Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆138Updated 2 years ago
- Run interactive android exploits in linux.☆147Updated 11 months ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆88Updated last year
- Send anonymous text messages with TOR and the TextBelt API☆67Updated 4 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Simple script masks the phishing link under the normal URL☆87Updated 4 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆153Updated 6 years ago
- Advanced information gathering & OSINT framework for phone numbers☆68Updated 2 weeks ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆209Updated 7 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago