unkn0wnh4ckr / venom
the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and more i do plan on adding more things to it in the future if you would like to see updates on this and other tools i make follow me on instagram: @tuf_unkn0wn
☆19Updated 5 years ago
Alternatives and similar repositories for venom:
Users that are interested in venom are comparing it to the libraries listed below
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- dedsec is a hacking framework filled with hacking tools that you can use directly in the script☆25Updated 5 years ago
- Advanced payload generetor and multi handler☆36Updated 4 years ago
- People Profiler (fake script)☆21Updated 4 months ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆17Updated 4 years ago
- Automated Password Cracking Tool☆16Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- python script that hide phishing url like a pro "masking url technique"☆37Updated 3 years ago
- Best Google Dorker Available☆33Updated 5 months ago
- ☆30Updated 8 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆14Updated 6 years ago
- forked from linux choice☆20Updated 5 years ago
- ☆32Updated 9 months ago
- Anonymous mail server for Termux☆12Updated 2 years ago
- Latest FUD GMail phishing webpage generator☆27Updated 4 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 3 years ago
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 3 years ago
- Track any ip address with IP-Tracer. IP-Tracer is developed for linux and android terminal like Termux and GNURoot Debian. you can retrie…☆23Updated 4 years ago
- Tools for Pentesting that all hacker need....☆16Updated 2 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Updated 6 years ago
- this FUD Payload☆39Updated 3 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Updated 5 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆13Updated 4 years ago
- Bypass Two-Factor-Authentication☆39Updated 7 years ago
- XploitSPY is an Android Monitoring / Spying Tool☆23Updated 4 years ago
- Wordlist générator, router flood and Wifi Cracker☆49Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆50Updated 7 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- Hack Anyone's WiFi☆16Updated last year
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago