unkn0wnh4ckr / tufhub
i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack, etc tools in it that you use directly in the script the twitter bruteforce does not work sadly
☆14Updated 6 years ago
Alternatives and similar repositories for tufhub:
Users that are interested in tufhub are comparing it to the libraries listed below
- This is just a security testing tool. Don't use for illigal purpose otherwise we are not responsible for your action.☆16Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Automated Password Cracking Tool☆16Updated 4 years ago
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 3 years ago
- Find usernames☆25Updated 4 years ago
- forked from linux choice☆21Updated 5 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Updated 5 years ago
- Multi facebook Cracking With Random Numbercloning☆18Updated last year
- Keylogger for ethical hackers☆15Updated 3 years ago
- ☆14Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- People Profiler (fake script)☆21Updated 6 months ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆20Updated 2 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆29Updated 6 years ago
- SHELL SCANNER☆19Updated 6 years ago
- Run you Localhost Server☆18Updated 6 months ago
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆13Updated 5 years ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.☆13Updated 2 years ago
- #Just simple program to spoofing device by sending malicious link☆7Updated 4 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Information Gathering & WebSite ReConnaissance.☆21Updated 7 years ago
- A Network Packet and Traffic Interceptor For Linux. Spoof ARP & Wiretap A Network.☆11Updated 3 years ago
- ☆12Updated 3 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- Hacking Tools For All Debian-based OS☆49Updated 7 years ago
- Second Edition Metasploit For Termux☆20Updated 7 years ago