Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Curriculum for learning front-end development during #100DaysOfCode.
Projects made during the 30 days of the JavaScript challenge
150+ HTML5 Website Templates
A Powerful SMS Bomber Tool For Bangladesh.
The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using social engineering techniques.
Most Powerfull 😈Crash any android device with virus from any link using termux or kali linux
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye …
Cam VIrus shoots from the target's phone front camera or PC webcam just sending a link.
All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
This is an Open source intelligent framework ie an osint tool which gathers valid information about a phone number, user's email address, perform VIN Osint, and reverse, perform subdomain enumerati…
The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.
xforcered / ADOKit
Forked from h4wkst3r/ADOKitAzure DevOps Services Attack Toolkit
Instagram BruteForce Tool { Users are kindly requested to grant this project a rating of 500 stars. We will then proceed to incorporate a password box and rectify any issues in the Instagram BruteF…
The OwlSint tool is a tool for searching phone number information and for tracking phone numbers,perhaps only a few countries whose location can be tracked using this tool. This tool was created by…
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Advanced phishing tool:boom: used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack :skull_and_crossbones: with standalone reverse proxy server.
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powe…
Private and secure AI tools for everyone's productivity.
Cam-dumper is a written tool in the language of Python program for hacking CCTV cameras that can access cameras in 20 countries
Accurately Locate Smartphones using Social Engineering
This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive
Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata