☆60Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for Awesome-Cellular-Hacking
Users that are interested in Awesome-Cellular-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- ☆15Apr 5, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Helping you delete your old accounts☆86Aug 23, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- ☆20Feb 25, 2026Updated last month
- GitOSINT: The OSINT Powerhouse for Discord. The go-to Discord bot for Open Source Intelligence (OSINT).☆106Aug 24, 2023Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Sep 29, 2025Updated 6 months ago
- create a "simulated internet" cyber range environment☆18Mar 31, 2026Updated 2 weeks ago
- ☆33Apr 23, 2023Updated 2 years ago
- RFM69 ISM Transceiver driver for esp-idf☆11Mar 26, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Apr 8, 2021Updated 5 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆203Apr 8, 2026Updated last week
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- List of periodically validated public DNS resolvers☆25Updated this week
- ☆153Jun 8, 2025Updated 10 months ago
- ☆23Jun 28, 2025Updated 9 months ago
- ☆38Apr 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆51Feb 8, 2024Updated 2 years ago
- ☆10Jan 1, 2023Updated 3 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆70Sep 25, 2023Updated 2 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 4 months ago
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆44Mar 13, 2026Updated last month
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆178Jan 12, 2026Updated 3 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- CVE-2022-46718: an app may be able to read sensitive location information.☆27May 1, 2023Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆20Mar 27, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Testing default web credentials☆34Dec 11, 2023Updated 2 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆44Oct 29, 2025Updated 5 months ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆27Jun 20, 2024Updated last year
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆13Jan 25, 2026Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago