Bitwise-01 / SQL-scanner
A tool that finds and scan sites for sql injection vulnerability
☆150Updated 5 years ago
Alternatives and similar repositories for SQL-scanner:
Users that are interested in SQL-scanner are comparing it to the libraries listed below
- Detect evil urls that uses IDN Homograph Attack.☆195Updated 7 years ago
- Quick SQL Scanner, Dorker, Webshell injector PHP☆232Updated 11 months ago
- PhishX - The Complete Spear Phishing Tool☆104Updated 6 years ago
- A Hackers framework☆139Updated 7 years ago
- Simple script masks the phishing link under the normal URL☆83Updated 4 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆81Updated last year
- Bruteforce script to bruteforce Login authentication pages. ( made for ctf )☆73Updated 4 months ago
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆141Updated 4 years ago
- DevBrute is a versatile password brute forcing tool designed to tackle a wide range of Social Media accounts and Web Applications. With i…☆216Updated last week
- Python wordlist generator☆166Updated 2 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆136Updated 3 years ago
- rang3r | Multi Thread IP + Port Scanner☆108Updated last year
- PROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS☆276Updated 3 years ago
- Backdoor Generator | Linux & Windows | FUD AV .py .exe☆107Updated 4 years ago
- smb scanner is the transport protocol.smb operates over TCp ports 139 and 445.☆58Updated 6 years ago
- [NEW] : Mega Bot ☣ Scanner & Auto Exploiter☆125Updated 4 years ago
- Succeser of blackeye v1.0, phishing tool with new 10 page added☆105Updated 2 years ago
- A Python Script to find admin panel of a site☆169Updated 2 years ago
- Automated Payload Generator Tool☆103Updated 4 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆107Updated last year
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆83Updated 2 years ago
- Leak Public IP from victim caller.☆97Updated last year
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Faceboom is a brute force application built on python 2.7 later upgraded to 3.6 which enables the tester to enter the victims account by …☆152Updated last year
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆127Updated 4 years ago
- Websploit is a high level MITM framework☆123Updated 2 years ago
- Nice list of google dorks for SQL injection☆123Updated 6 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆418Updated 2 years ago
- htk-lite is a lighter version of hackers-tool-kit but it still has the same hacking ability as hackers-tool-kit☆113Updated 3 years ago
- Tool to check if an app is installed on the target device through a link☆106Updated 4 years ago