mobile version of my CIA hacking tool with nmap upgrades meant for termux and nethunter
☆10Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for CIA-mobile-
Users that are interested in CIA-mobile- are comparing it to the libraries listed below
Sorting:
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆14Feb 23, 2019Updated 7 years ago
- Its a virus tool which destroys pc faster...☆15Sep 27, 2021Updated 4 years ago
- Crack md5 hash is a shell script used to decipher and crack MD5 hashes via a wordlist dictionary.☆15Jun 14, 2021Updated 4 years ago
- Ping2death is a ddos to send packet over a user.. Its has a custom amount of packet☆15Sep 22, 2021Updated 4 years ago
- A simple chess made specially for termux☆12Dec 15, 2020Updated 5 years ago
- Zip brute is a python script that cracks zip that are password protected using a wordlist dictionary.☆23Jun 14, 2021Updated 4 years ago
- wget -O install-nethunter-termux https://offs.ec/2MceZWr chmod +x install-nethunter-termux ./install-nethunter-termux☆12Sep 21, 2022Updated 3 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A tool for installing metasploit in your termux☆21Dec 10, 2020Updated 5 years ago
- 💣 📱 💀 Ultimate sms bomber☆28Mar 21, 2021Updated 4 years ago
- ☆34Jan 22, 2025Updated last year
- A script written in python☆35Feb 8, 2025Updated last year
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 4 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- A simple Arduino Library to send message on Discord using webhook☆14Feb 25, 2025Updated last year
- USB rubber ducky reverse shell with disabling windows defender☆12Apr 17, 2021Updated 4 years ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- Redefining Web Operating Systems☆18Sep 22, 2025Updated 5 months ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Hacking account of instagram with 39.000 Password list☆37Feb 12, 2021Updated 5 years ago
- python script that hide phishing url like a pro "masking url technique"☆43Jul 21, 2021Updated 4 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Here are some of ethical hacking tools and scripts in python.☆11Dec 11, 2021Updated 4 years ago
- Simple Admin Finder☆11Apr 25, 2023Updated 2 years ago
- A Cross-Platform Telegam Members Scraping and Adding Tool☆10May 27, 2021Updated 4 years ago
- A userscript to improve various features of FetLife.com, especially data portability and interoperability functionality.☆10Jun 19, 2014Updated 11 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the …☆11Sep 19, 2024Updated last year
- PSScanner is made for IT administrators to scan corporate network, showing IP address, hostname, current logon user and serialnumber for …☆11Dec 29, 2023Updated 2 years ago
- A Firefox plugin that allows you to choose easily between different DNS over HTTPS servers☆12Apr 28, 2020Updated 5 years ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- This project uses an ESP32-Cam connected to a motion sensor. When the motion sensor is activated, a photo will be submitted to the desire…☆11Sep 4, 2021Updated 4 years ago
- ☆11Feb 3, 2026Updated last month
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago