Config-Exploiter Dump config.php file from joomla and wordpress websites
☆39Sep 30, 2018Updated 7 years ago
Alternatives and similar repositories for Config-Exploiter
Users that are interested in Config-Exploiter are comparing it to the libraries listed below
Sorting:
- Website : tunisianeagles.github.io☆16Nov 3, 2018Updated 7 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆209Oct 31, 2018Updated 7 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆243Feb 6, 2021Updated 5 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆260Nov 14, 2018Updated 7 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi☆1,908Nov 9, 2023Updated 2 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆15Oct 26, 2020Updated 5 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆14Oct 21, 2019Updated 6 years ago
- Open Source Intelligence Tools, Writeups, Web Reconnaissance, Toolkits, Other Awesome Represotries and More☆15Apr 28, 2020Updated 5 years ago
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆40Jan 13, 2026Updated last month
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Python-based vulnerability detection tool for web applications☆18Jul 31, 2024Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- Virus Repository☆50Oct 13, 2024Updated last year
- Hacker101☆46Aug 14, 2018Updated 7 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- beyawak tools, this tools for termux pentest☆57Jan 3, 2019Updated 7 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Oct 24, 2017Updated 8 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 3 months ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Mar 23, 2015Updated 10 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- GoSniper is a DoS tool/DDoS tool.☆22Aug 21, 2022Updated 3 years ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆60Nov 30, 2022Updated 3 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- ☆29Apr 16, 2020Updated 5 years ago
- Tool to execute BREACH attack.☆26Jul 27, 2018Updated 7 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated this week
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 10 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago