There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Gmail-Brutforcer
A tool for root force attacks on the smtp serviceInstaBrut3
A tool for brute force attacks on Instagram accounts. EnjoyWhatsApp-Bot
WhatsApp is a messenger robot that you can use to do repetitive and manual tasks in this messenger automatically and automatically.PasswordMaker
Linux-For-Hackers-
With this book, you can completely master Linux and use it in penetration testing.word2pdf
This program helps you convert docx files to pdf filesTwitter_Bot
Twitter bot to enter the site and follow usersH4shcrack
Using this tool (program) you can crack passwords and encrypted words in different formats.change-2-hash
your password(any things password) changed to hash for security moorekey10gger
this is a keylogger for keyboadArp_Spoofing
ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.Rar_Cracker
This tool helps you to crack the password of Rar filespyDdos
What Is A DDos-Attack A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailableSimple-CTF-Exploit
d0wnl04d3r
can your anything link to download use of programPython-Shell
W3bScraping
The Web Scarping Tool Writing With Python :)key1ogger
Ddos-script
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources from banks to news websites, and present a major challenge to making sure people can publish and access important informationyoukiuo
This tool is used to crack passwords and is useful for web page login page attacks and brute force attacks at the network and web level.SMTP-protocol-census
SMTP In some vulnerable configurations, email servers can also be aggregated Use information that gives us information about the host or network Give. The SMTP protocol supports some basic commands such as VRFY and EXPN Slowly A VRFY request asks the server to verify an email address while Which requests an EXPN request for email list membership. These requests are The power is sometimes misused to verify the existence of a user on the email server Used by hackers laterLove Open Source and this site? Check out how you can help us