unkn0wnh4ckr / venomLinks
the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and more i do plan on adding more things to it in the future if you would like to see updates on this and other tools i make follow me on instagram: @tuf_unkn0wn
☆19Updated 6 years ago
Alternatives and similar repositories for venom
Users that are interested in venom are comparing it to the libraries listed below
Sorting:
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆20Updated 3 years ago
- dedsec is a hacking framework filled with hacking tools that you can use directly in the script☆27Updated 6 years ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Updated 3 years ago
- Run you Localhost Server☆27Updated last year
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Updated 7 years ago
- python script that hide phishing url like a pro "masking url technique"☆41Updated 4 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆19Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- People Profiler (fake script)☆25Updated last year
- Paypal phishing tool☆30Updated 7 years ago
- Payload delivery via URL and some social engineering.☆17Updated last year
- Best Google Dorker Available☆39Updated last year
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Updated 6 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆49Updated 4 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 5 years ago
- Link Reveal☆27Updated last year
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆48Updated 7 years ago
- Ro3b - Advance Banking HTTP Botnet☆51Updated 2 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆38Updated 3 years ago
- remote administrator framework☆22Updated last year
- Wi-Fi Password Stealer☆64Updated last year
- Facebook Group Admin Takeover☆28Updated last year
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆46Updated 4 years ago
- ☆12Updated 4 years ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆32Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- Latest FUD GMail phishing webpage generator☆30Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago