Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
View bunitaitaa's full-sized avatar

Block or report bunitaitaa

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. AndroRAT AndroRAT Public

    Forked from karma9874/AndroRAT

    A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side

    Java

  2. zphisher zphisher Public

    Forked from htr-tech/zphisher

    An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !

    HTML

  3. GhidraMCP GhidraMCP Public

    Forked from LaurieWired/GhidraMCP

    MCP Server for Ghidra

    Java

  4. CamPhish CamPhish Public

    Forked from techchipnet/CamPhish

    Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.

    HTML

  5. Storm-Breaker Storm-Breaker Public

    Forked from ultrasecurity/Storm-Breaker

    Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}

    HTML

  6. Android-IMSI-Catcher-Detector Android-IMSI-Catcher-Detector Public

    Forked from CellularPrivacy/Android-IMSI-Catcher-Detector

    AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!

    Java

Morty Proxy This is a proxified and sanitized view of the page, visit original site.