ytisf / CreepyCrawler
A simple Python tool to harvest email addresses from Google.
☆15Updated 10 years ago
Alternatives and similar repositories for CreepyCrawler:
Users that are interested in CreepyCrawler are comparing it to the libraries listed below
- General tools and scripts i want to make public to the world.☆45Updated 6 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 4 years ago
- Public exploits (re)writed while learning.☆12Updated 11 years ago
- ARP spoof then session jack within your browser☆29Updated 11 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- a simple, barely functional, prototyping RAT (Remote Administration Tool)☆9Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 3 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Share wifi on windows with arranged password like every hour or every day☆15Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- The Watcher version 5.0☆18Updated 7 years ago
- flood area with fake essids☆21Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆49Updated 7 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago