unkn0wnh4ckr / tufhubLinks
i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack, etc tools in it that you use directly in the script the twitter bruteforce does not work sadly
☆14Updated 6 years ago
Alternatives and similar repositories for tufhub
Users that are interested in tufhub are comparing it to the libraries listed below
Sorting:
- This is just a security testing tool. Don't use for illigal purpose otherwise we are not responsible for your action.☆16Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- People Profiler (fake script)☆23Updated 7 months ago
- Run you Localhost Server☆19Updated 7 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆14Updated 5 years ago
- Automated Password Cracking Tool☆17Updated 4 years ago
- A Network Packet and Traffic Interceptor For Linux. Spoof ARP & Wiretap A Network.☆11Updated 3 years ago
- SHELL SCANNER☆19Updated 6 years ago
- #Just simple program to spoofing device by sending malicious link☆8Updated 4 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 5 years ago
- ☆14Updated 2 years ago
- Multi facebook Cracking With Random Numbercloning☆19Updated last year
- Now you can download the most powerful tools using this simple script☆12Updated 6 years ago
- forked from linux choice☆21Updated 5 years ago
- Complete and modifyable ransomware program☆11Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆55Updated 7 years ago
- Facebook Group Admin Takeover☆23Updated 7 months ago
- Link Reveal☆24Updated 7 months ago
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 3 years ago
- Best Google Dorker Available☆36Updated 7 months ago
- WH-Rat for windows and Android : Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It…☆12Updated 4 years ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.☆13Updated 2 years ago
- Anonymous mail server for Termux☆13Updated 3 years ago
- Evilip Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. E…☆30Updated 2 years ago