ByCh4n / Delebetor
Installs and adjusts Pentest tools.
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Delebetor
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 2 months ago
- Cloudflare Bypass Script☆22Updated 4 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Updated 2 years ago
- ☆21Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated 7 months ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- Whspdefendor Exploit Framework v1.0☆13Updated 11 months ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 3 months ago
- Embedding executable files in PDF Documents☆44Updated 5 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆32Updated 6 months ago
- VLAN attacks toolkit☆13Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 2 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- A compilation of snort rules for detecting malware traffic.☆15Updated 3 years ago
- Fetch information about a public Google document.☆11Updated last year
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated 4 months ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago