AuxGrep / InvisibleManLinks
Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY
☆10Updated 2 years ago
Alternatives and similar repositories for InvisibleMan
Users that are interested in InvisibleMan are comparing it to the libraries listed below
Sorting:
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 6 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Updated 2 years ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- A fast subdomain takeover tool☆85Updated 2 years ago
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated 3 months ago
- This repository contains the best fuzzing wordlist files☆34Updated last year
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- Gmail/GSuite account enumeration tool☆55Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Updated 3 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- ☆90Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆74Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆53Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆51Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50☆25Updated 3 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- ☆28Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year