Lists (1)
Sort Name ascending (A-Z)
Starred repositories
A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
Python sample codes and textbook for robotics algorithms.
Darksidesfear / KingCarder
Forked from hestihesti/KingCarder<BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL PURPOSES ONLY *** I AM NOT RESPONSIBLE FOR ANY MISUSE ***
Generates a key and saves key to a file under {filename}.key
A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
Hacking account of instagram with 39.000 Password list
Accurately Locate Smartphones using Social Engineering
pretech86 / Zeebsploit
Forked from pashayogi/Zeebsploitweb scanner - exploitation - information gathering
Open source software that helps you create and deploy high-frequency crypto trading bots
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Buzz transcribes and translates audio offline on your personal computer. Powered by OpenAI's Whisper.
Clonezilla is a partition or disk clone tool similar to Norton Ghost®. It saves and restores only used blocks in hard drive. Two types of Clonezilla are available, Clonezilla live and Clonezilla SE…
pretech86 / droidfiles
Forked from vaginessa/droidfilesGet files from Android directories
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or setup with Docker.
pretech86 / Silver
Forked from s0md3v/SilverMass scan IPs for vulnerable services
pretech86 / spraykatz
Forked from aas-n/spraykatzCredentials gathering tool automating remote procdump and parse of lsass process.
Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security assessments and audits, incident response, compliance, harden…
Jailbreak for A8 through A11, T2 devices, on iOS/iPadOS/tvOS 15.0, bridgeOS 5.0 and higher.
Clone a voice in 5 seconds to generate arbitrary speech in real-time
Tools Hack Fb Teman Versi 3.0 Work