unkn0wnh4ckr / dedsec
dedsec is a hacking framework filled with hacking tools that you can use directly in the script
☆26Updated 5 years ago
Alternatives and similar repositories for dedsec:
Users that are interested in dedsec are comparing it to the libraries listed below
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 6 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 3 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆75Updated 3 months ago
- Virus Repository☆44Updated 6 months ago
- Wordlist générator, router flood and Wifi Cracker☆50Updated 5 years ago
- ☆32Updated 10 months ago
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆13Updated 4 years ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆25Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- Meterpreter payload for all platforms☆67Updated 3 years ago
- IP and geolocation tracking tool☆53Updated 6 months ago
- Wi-Fi Password Stealer☆55Updated 6 months ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Advanced payload generetor and multi handler☆38Updated 4 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- The Most Powerful Fake Page Redirecting tool...☆54Updated 3 years ago
- ☆19Updated last year
- Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks☆64Updated 2 years ago
- Finder Web Site Admin Login Page☆60Updated 3 years ago
- It has been developed in order to facilitate the use of ready-made Brute Force tools in Kali-Linux operating systems and is written in Py…☆16Updated 4 years ago
- BlueHunter is bluetooth device hacking framework☆21Updated last year
- Best Google Dorker Available☆33Updated 6 months ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆39Updated 3 years ago
- discontinued | New >> Backhack >> https://github.com/AngelSecurityTeam/BackHAck☆25Updated 5 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Admin Panel Bruteforce☆68Updated 6 months ago
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆22Updated 6 months ago
- tools, mallware; phishing, botnet, database , courses ..☆71Updated 3 years ago
- A router Sploit is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece o…☆56Updated 3 years ago