vrikodar / ThorView external linksLinks
BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH
☆17May 2, 2024Updated last year
Alternatives and similar repositories for Thor
Users that are interested in Thor are comparing it to the libraries listed below
Sorting:
- Setup a AES Encrypted communication Between two machines Right from terminal☆17Sep 2, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- Phishing Campaign Toolkit☆11Mar 15, 2020Updated 5 years ago
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- socksh(v3.0) automatically scrapes socks5 proxies from spyones list and can then also add alive proxies to proxychains.conf file in matte…☆14Aug 9, 2021Updated 4 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Apr 22, 2023Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 3 years ago
- Sqli-Scanner is a python3 script written to scan websites for SQL injection vulnerabilities Features 1 Scan one website 2 Scan multiple…☆23Nov 6, 2021Updated 4 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Email-Enum searches mainstream websites and tells you if an email is registered!☆19Mar 14, 2019Updated 6 years ago
- Android Hacking Over Wan☆23Dec 23, 2019Updated 6 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Copy of Fresh Onions is an open source TOR spider / hidden service onion crawler☆30Jan 5, 2021Updated 5 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- Transform your batch (bat) script into one binary.exe☆52Feb 11, 2024Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Aug 17, 2021Updated 4 years ago
- A tool for bypass certify pinning in Android apps☆25Apr 11, 2020Updated 5 years ago
- gobbo-rage-mic☆19Mar 16, 2025Updated 10 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A semi-automatic osint/recon framework.☆24May 22, 2024Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Jul 19, 2024Updated last year
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Automate TikTok view submissions using Zefoy with Python and Selenium — no login required.☆41Aug 9, 2025Updated 6 months ago
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago