zidansec / ToolsBox
This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools that exist on kali linux.
☆14Updated 2 years ago
Alternatives and similar repositories for ToolsBox:
Users that are interested in ToolsBox are comparing it to the libraries listed below
- An Automated Database Hacking Software with Database Dorks Hacking☆29Updated 5 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆27Updated 3 years ago
- Reverse And Dorking Tools☆25Updated 3 years ago
- python script that hide phishing url like a pro "masking url technique"☆38Updated 3 years ago
- Facebook bot dumper&scraper☆33Updated 5 months ago
- An OSINT focused tool made with Nodejs!☆13Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Dorking google with python (easy) (support Termux)☆48Updated 4 years ago
- Automated Ip Tracking Tool☆27Updated 2 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆32Updated last year
- it's a powerful and effective tool for attacking Wi-Fi networks and it supports many different attacks☆16Updated last year
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆22Updated 3 years ago
- Meterpreter payload for all platforms☆67Updated 3 years ago
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆22Updated 2 months ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago
- Encryptor and File Manager | bypass webshell upload☆30Updated 3 years ago
- People Profiler (fake script)☆21Updated 5 months ago
- BlueHunter is bluetooth device hacking framework☆20Updated last year
- that is a very sophisticated deface tool☆10Updated 2 years ago
- The ultimate Metasploit apk binder with legit apk written in python3☆33Updated 3 years ago
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆35Updated 4 months ago
- IP and geolocation tracking tool☆52Updated 6 months ago
- forked from linux choice☆21Updated 5 years ago
- ☆22Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- Best Google Dorker Available☆33Updated 6 months ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆29Updated 3 years ago
- Dogma V1.5.3☆28Updated 5 years ago