Anandesh-Sharma / 0Day-ExploitsLinks
All Zero Day Exploits
☆19Updated 7 years ago
Alternatives and similar repositories for 0Day-Exploits
Users that are interested in 0Day-Exploits are comparing it to the libraries listed below
Sorting:
- Damn Small SQLi Scanner. (DSSS)☆16Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆16Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- this tool only for educational purpose . Disclaimer: We are no responsibility any action . if you want you use for educational purpose …☆8Updated 5 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆29Updated 7 years ago
- Web Application Vulnerability Scanner☆19Updated 6 years ago
- pen testing scripts☆12Updated 4 years ago
- ☆20Updated 11 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Record X11 keypress events to a log file☆26Updated 7 years ago
- Automating the SQL Injection through Google dorks.☆26Updated 2 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 5 years ago
- SHELL SCANNER☆20Updated 6 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 6 years ago
- Repository of tools used in my blog☆51Updated last year
- Phishing tool with 26 platforms and custom subdomain names☆9Updated 4 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆38Updated 6 years ago