Hussainiss12's starred repositories

Bluetooth-DOS-Attack

Bluetooth DOS Attack Script for Educational Purposes. Used in School Project

Language:PythonStargazers:70Issues:0Issues:0

marple

📖 Collect links to profiles by username through search engines and analyze with various plugins

Language:PythonLicense:MITStargazers:205Issues:0Issues:0

sherlock

Hunt down social media accounts by username across social networks

Language:PythonLicense:MITStargazers:53081Issues:0Issues:0

GH05T-INSTA

Insta BruteForce { GH05T-INSTA 7.01 } Fork it...

Language:ShellLicense:NOASSERTIONStargazers:647Issues:0Issues:0

statistically-likely-usernames

Wordlists for creating statistically likely username lists for use in password attacks and security testing

Stargazers:878Issues:0Issues:0
Language:Visual Basic .NETLicense:MITStargazers:21Issues:0Issues:0

venom

venom - C2 shellcode generator/compiler/handler

Language:ShellStargazers:1750Issues:0Issues:0

Telerecon

A reconnaissance framework for researching and investigating Telegram.

Language:PythonStargazers:814Issues:0Issues:0

DoxTracker

Simple Doxing Tool

Language:PythonStargazers:269Issues:0Issues:0

BCHackTool

HackToolKit

Language:ShellLicense:GPL-3.0Stargazers:461Issues:0Issues:0
Language:JavaScriptLicense:GPL-3.0Stargazers:8Issues:0Issues:0

Xiongmai-Net-Surveillance-Authentication-Bypass

Exploit to bypass Xiongmai surveillance camera authentication mechanism

Language:PythonStargazers:26Issues:0Issues:0

indicator-intelligence

Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.

Language:PythonLicense:GPL-3.0Stargazers:90Issues:0Issues:0

RadareEye

Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.

Language:ShellLicense:GPL-3.0Stargazers:352Issues:0Issues:0

Remot3d

Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors

Language:ShellStargazers:281Issues:0Issues:0

r4ven

Track the IP address and GPS location of the user's smartphone or PC and capture a picture of the target, along with device information.

Language:HTMLLicense:MITStargazers:576Issues:0Issues:0

Weaponry

A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python

Language:C#Stargazers:103Issues:0Issues:0

DEDSEC_PEOPLE_SEARCH

Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!

License:MITStargazers:16Issues:0Issues:0

DEDSEC_ADMIN_PASS_STEALER

dedsec admin is a piso wifi admin username and password stealer tool

Language:PythonLicense:MITStargazers:6Issues:0Issues:0

TgaHacking

Social Media Hacking & Information Tool

Language:ShellLicense:Apache-2.0Stargazers:139Issues:0Issues:0
License:MITStargazers:5Issues:0Issues:0

okadminfinder

[ Admin panel finder / Admin Login Page Finder ] ¢σ∂є∂ ву 👻 (❤-❤) 👻

Language:PythonLicense:Apache-2.0Stargazers:558Issues:0Issues:0

KitHack

Hacking tools pack & backdoors generator.

Language:PythonLicense:MITStargazers:1613Issues:0Issues:0

infect

Infect Any Android Device With Virus From Link In Termux

Language:ShellLicense:MITStargazers:2206Issues:0Issues:0

zeek

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.

Language:C++License:NOASSERTIONStargazers:6253Issues:0Issues:0

TorBot

Dark Web OSINT Tool

Language:PythonLicense:NOASSERTIONStargazers:2779Issues:0Issues:0

Hide-CobaltStrike

Hide your CobaltStrike PRO

Stargazers:159Issues:0Issues:0

X-osint

This is an Open source intelligent framework ie an osint tool which gathers valid information about a phone number, user's email address, perform VIN Osint, and reverse, perform subdomain enumeration, able to find email from a name, and so much more. Best osint tool for Termux and linux

Language:PythonLicense:GPL-3.0Stargazers:896Issues:0Issues:0

frp

A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.

Language:GoLicense:Apache-2.0Stargazers:82935Issues:0Issues:0

top-attack-techniques

Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques to focus on first.

Language:VueLicense:Apache-2.0Stargazers:114Issues:0Issues:0