ultrasecurity / Malware-Kit
A tool to test penetration into personal systems (current version is beta)
☆30Updated 2 years ago
Alternatives and similar repositories for Malware-Kit:
Users that are interested in Malware-Kit are comparing it to the libraries listed below
- Reverse And Dorking Tools☆25Updated 3 years ago
- XploitSPY is an Android Monitoring / Spying Tool☆23Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆27Updated 3 years ago
- A Network Packet and Traffic Interceptor For Linux. Spoof ARP & Wiretap A Network.☆11Updated 3 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆29Updated 5 years ago
- Keylogger using pynput + mail sender☆51Updated 4 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆29Updated 6 years ago
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆7Updated 2 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆25Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- All Zero Day Exploits☆19Updated 7 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆35Updated 4 months ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Updated 6 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆29Updated 3 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 5 years ago
- Virus Repository☆22Updated 3 years ago
- Remote persistent keylogger for Windows and Linux..☆11Updated 2 years ago
- A simple vuln web scanner☆38Updated 6 years ago
- Exsploit create malicious chrome extension to steal facebook account password☆22Updated 5 years ago
- SHELL SCANNER☆18Updated 5 years ago
- Tools for Pentesting that all hacker need....☆16Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Best Google Dorker Available☆33Updated 5 months ago