snotsbubble's repositories
aSYNcrone
[STILL UNDER DEVELOPMENT] aSYNcrone is a SYN Flood DDoS Tool!
exiftool
ExifTool meta information reader/writer
facebook-login-for-robots
Facebook Login for 🤖 robots
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
HeraKeylogger
Chrome Keylogger Extension | Post Exploitation Tool
Infect
A new fun way to send virus to your victim from just link in termux
Lazymux
termux tool installer
LittleBrother
Information gathering (OSINT) on a person (EU)
msfpc
MSFvenom Payload Creator (MSFPC)
onex
onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
PhoneSploit
Using open Adb ports we can exploit a Andriod Device
quack
Quack Toolkit is a set of tools for performing a denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
saycheese
Grab target's webcam shots by link
seeker
Accurately Locate Smartphones using Social Engineering
sherlock
🔎 Hunt down social media accounts by username across social networks
SpyCam
A free and powerful Spy Camera application for your Android device
Tbanner
Give A Awesome Look to your Termux App
Termux
Cool Termux Banner
termux-desktop
Setup A Beautiful Desktop/GUI In Termux
TermuxBlack
Termux repository for hacking tools and packages
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
trape
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
venom
venom - shellcode generator/compiler/handler (metasploit)
vim-better-whitespace
Better whitespace highlighting for Vim
web2attack
Web hacking framework with tools, exploits by python
wfuzz
Web application fuzzer
wifi-deauth-rpi-wardrive
Wifi deauthenticate all networks with raspberry pi zero w in your backpack. Useful for public places
XSStrike
Most advanced XSS scanner.