ByCh4n / Delebetor
Installs and adjusts Pentest tools.
☆10Updated 2 years ago
Alternatives and similar repositories for Delebetor:
Users that are interested in Delebetor are comparing it to the libraries listed below
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Cloudflare Bypass Script☆22Updated 5 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆32Updated 8 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 4 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 5 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆21Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated last year
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆14Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- CVE-2023-23192☆13Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆38Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆30Updated 2 years ago
- ☆9Updated 2 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- ☆24Updated last year
- delosNmap | Nmap Script☆38Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 9 months ago
- Active Directory Penetration Testing Tool☆27Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated last month
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago