Giter VIP home page Giter VIP logo

sambasiva19's Projects

androrat icon androrat

A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side

burp-suite icon burp-suite

|| Activate Burp Suite Pro with Key-Generator and Key-Loader ||

camhacker icon camhacker

Camera phishing tool. If anyone opens link generated by CamHacker and permits camera access his/her photo will be captured!

camphish icon camphish

Grab cam shots from target's phone front camera or PC webcam just sending a link.

fsociety icon fsociety

fsociety Hacking Tools Pack – A Penetration Testing Framework

holytips icon holytips

A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

howtohunt icon howtohunt

Collection of methodology and test case for various web vulnerabilities.

maxphisher icon maxphisher

A python phishing script for login phishing, image phishing video phishing and many more

pyphisher icon pyphisher

Easy to use phishing tool with 77 website templates. Author is not responsible for any misuse.

social-engineer-toolkit icon social-engineer-toolkit

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

socialmediahackingtoolkit icon socialmediahackingtoolkit

Social Media Hacking Toolkit is a collection of tools designed to carry out attacks such as brute-force attacks, mass reporting, and phishing on social media platforms including Instagram, Facebook, Twitter, and Gmail.

storm-breaker icon storm-breaker

Social engineering tool [Access Webcam & Microphone & Location Finder] With Python

subdominator icon subdominator

SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty

thefatrat icon thefatrat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software

undetectable icon undetectable

Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.

villain icon villain

Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).

zphisher icon zphisher

An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.