Pinned Repositories
Bombers
SMS/Email/Whatsapp/Twitter/Instagram bombers Collection :bomb::bomb::bomb: :boom: Also added collection of some Fake SMS utilities which helps in skip phone number based SMS verification by using a temporary phone number that acts like a proxy.
ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
infection
Virus Spreader, Hack windows (nc shell=default), Os_deletion
shell_gpt
A command-line productivity tool powered by GPT-3 and GPT-4, will help you accomplish your tasks faster and more efficiently.
spoofcheck
Simple script that checks a domain for email protections
Spyroid-Rat
Get The Best Android Rat On The Market, Spyroid Rat
adbwebkit
ADB For Hackers (:
Anonymous
BeAnonymous
BeAnonymous is a Python based application with which you can generate videos in the exact same way as the one made by Anonymous.
Beast_Bomber
The best open source bomber / Лучший open source бомбер
KingOkys's Repositories
KingOkys/gophish
Open-Source Phishing Toolkit
KingOkys/MultiEvilnoVNC
Ready to go Phishing Platform
KingOkys/BotnetC2
THANKS YOU FOR CODE | credit NixWasHere/NixC2
KingOkys/BlackFriday-GPTs-Prompts
List of free GPTs that doesn't require plus subscription
KingOkys/I-S00N
Anxun Shanghai (I-SOON) Data Dump Translations (PII Redacted)
KingOkys/beef
The Browser Exploitation Framework Project
KingOkys/W0rm-Gpt
This tool named "W0rm-GPT" is mainly use to research all activities which ChatGPT cant't give , All working apis are present in the script , If you do any illegal activites through this script we are not responsible
KingOkys/shell_gpt
A command-line productivity tool powered by GPT-3 and GPT-4, will help you accomplish your tasks faster and more efficiently.
KingOkys/Spyroid-Rat
Get The Best Android Rat On The Market, Spyroid Rat
KingOkys/pwnedOrNot
OSINT Tool for Finding Passwords of Compromised Email Addresses
KingOkys/HORNET-RAT
Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...
KingOkys/incubator-pegasus
Apache Pegasus - A horizontally scalable, strongly consistent and high-performance key-value store
KingOkys/king-phisher
Phishing Campaign Toolkit
KingOkys/eLys
👾- An open-source post-exploitation framework, researchers and developers.
KingOkys/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
KingOkys/BeAnonymous
BeAnonymous is a Python based application with which you can generate videos in the exact same way as the one made by Anonymous.
KingOkys/Beast_Bomber
The best open source bomber / Лучший open source бомбер
KingOkys/adbwebkit
ADB For Hackers (:
KingOkys/Canary
Canary is a Python3 bot designed for the McGill University Community Discord Server. The bot provides helper functions to users, as well as fun functions, a quote database and custom greeting messages.
KingOkys/snappy
KingOkys/Anonymous
KingOkys/Bombers
SMS/Email/Whatsapp/Twitter/Instagram bombers Collection :bomb::bomb::bomb: :boom: Also added collection of some Fake SMS utilities which helps in skip phone number based SMS verification by using a temporary phone number that acts like a proxy.
KingOkys/ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
KingOkys/RXS-SMS-BOMBER
Sms + Call Mix Bomber
KingOkys/pegasus_spyware
decompiled pegasus_spyware
KingOkys/tochka-free-market
KingOkys/fosscad-repo
Official FOSSCAD Library Repository
KingOkys/Embedded-Backdoor-Connection
This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.
KingOkys/spoofcheck
Simple script that checks a domain for email protections
KingOkys/RedGhost
Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.