tvvnp2 / Leak-ToolView external linksLinks
☆13Jun 29, 2023Updated 2 years ago
Alternatives and similar repositories for Leak-Tool
Users that are interested in Leak-Tool are comparing it to the libraries listed below
Sorting:
- Automated enumeration for red teamers☆10Nov 22, 2022Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆14Aug 22, 2024Updated last year
- UpAnime : Modern Search Engine API for Manga.☆10Jun 11, 2024Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Nov 29, 2022Updated 3 years ago
- Enable OpenCode to generate images using Antigravity models.☆26Feb 9, 2026Updated last week
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- 'mispitools' is an open-source package written in the R statistical language. It consists of a collection of decision-making tools design…☆38Jan 28, 2026Updated 2 weeks ago
- Take down your target Telegram channels by this program☆13Nov 16, 2025Updated 3 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Updated this week
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- This tool is design for FTP brute force☆13Jan 23, 2024Updated 2 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 9 months ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- This program scrapes followers' usernames from a specified Instagram account!☆12Jan 9, 2022Updated 4 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Anomm is a free service to deliver anonymous messages directly to your telegram 🚀 via bot. this can be integrated anywhere ⚡ community r…☆13Mar 19, 2023Updated 2 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- EWDK C++ toolchain for bazel☆11Feb 1, 2026Updated 2 weeks ago
- Christian IPTV☆11Jul 18, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- Phone number tracer in bash, enjoy!☆10Dec 2, 2021Updated 4 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- From country name, Network /Service and location☆11Jul 17, 2024Updated last year
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- ☆14Apr 6, 2025Updated 10 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago