CPScript / HTTP-DefaceLinks
This script exploits a vulnerability related to insecure file uploads, specifically targeting web applications that allow users to upload files without proper validation or restrictions. Here's a breakdown of the relevant vulnerabilities:
☆13Updated last year
Alternatives and similar repositories for HTTP-Deface
Users that are interested in HTTP-Deface are comparing it to the libraries listed below
Sorting:
- launch spiderfoot easily from any terminal!☆15Updated 2 years ago
- ✨Special✨☆10Updated last week
- USB Ransomware, will encrypt SOME files and steal some, you can change what it steals.☆35Updated last year
- A Simple but Strong DDoS tool used for taking out websites with certain security issues.☆15Updated last year
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆24Updated last year
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆31Updated 3 years ago
- There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another comput…☆45Updated 4 years ago
- A simple bash script to install and run tor in linux☆12Updated 2 years ago
- Gmail-Brute Force Tool ;)☆51Updated last year
- Meterpreter payload for all platforms☆72Updated 3 years ago
- Metasploit Framework auto installer for termux 2023 - NO errors☆20Updated last year
- This python script will capture all of the keystrokes within a given time frame and report them to a Discord Server using Webhooks. Inste…☆28Updated 5 months ago
- Websites Vulnerability Scanner☆75Updated 6 months ago
- GUI based tool to track location and more info of mobile numbers☆78Updated 2 years ago
- Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)☆82Updated 3 years ago
- A tool to generate valid ip addresses of 55 countries. These ip's can be used for OpenBullet.☆33Updated last year
- Easily Install Ngrok on Linux☆16Updated last year
- Distributed Denial of Service - Website Stress☆43Updated last year
- Make your Android phone a hacking device with this very simple installation menu☆17Updated 5 months ago
- Best Google Dorker Available☆39Updated last year
- The Most Powerful Fake Page Redirecting tool...☆53Updated 3 years ago
- Hacking Toolkit☆100Updated last year
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆111Updated 3 years ago
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆98Updated last year
- THIS REPOSITORY ONLY MADE FOR PROVIDING SPOOFING CALL AND EMAIL☆12Updated 2 years ago
- This is a multipurpose tool which is useful in networking or network hacking.☆81Updated 2 years ago
- create unlimited passwords to brute force any account! This tool is created only for educational purpose.☆27Updated 2 years ago
- A powerfull recon cat tool☆28Updated 3 weeks ago
- ☆14Updated 5 years ago
- PHP email spoofer | Send emails from any email adress☆82Updated 5 years ago