tokyoneon / ArcaneLinks
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.
☆155Updated 5 years ago
Alternatives and similar repositories for Arcane
Users that are interested in Arcane are comparing it to the libraries listed below
Sorting:
- A Framework meant for the exploitation of iOS devices.☆222Updated 4 years ago
- AppleID Bruteforce☆140Updated 4 years ago
- Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video☆125Updated last year
- WikiLeaks Vault 7 CIA Hacking Tools☆192Updated 2 years ago
- BEST HACKING TOOLS..For more tools visit our blog for Hackers☆138Updated last month
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- SMS Phishing Tools☆80Updated 8 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆82Updated 4 years ago
- Run interactive android exploits in linux.☆147Updated 9 months ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆147Updated 5 years ago
- Send anonymous text messages with TOR and the TextBelt API☆68Updated 4 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆66Updated 5 years ago
- Get files from Android directories☆11Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆57Updated 8 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆108Updated 5 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆110Updated 7 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆137Updated 2 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Updated 10 years ago
- Advanced information gathering & OSINT framework for phone numbers☆70Updated 2 months ago
- Simple script masks the phishing link under the normal URL☆87Updated 4 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆150Updated 6 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 4 years ago
- Fake-AP to perform Evil Twin Attack☆67Updated 7 years ago