Python-based vulnerability detection tool for web applications
☆18Jul 31, 2024Updated last year
Alternatives and similar repositories for WebGuardian
Users that are interested in WebGuardian are comparing it to the libraries listed below
Sorting:
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Get information of any phone number. A simple color full tool in python3 for extracting information.☆65Nov 7, 2024Updated last year
- CloudFlare bypass, Breacher, FindPerson, GeneratorIP☆36Apr 9, 2023Updated 2 years ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- An open-source .NET Ransomware☆24Aug 2, 2021Updated 4 years ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Jun 4, 2025Updated 8 months ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆15Oct 26, 2020Updated 5 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- Black Webbrowser v2.0☆17Sep 22, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Facebook bot dumper&scraper☆39Oct 13, 2024Updated last year
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Sep 6, 2018Updated 7 years ago
- Creacion de puertas traseras (backdoors) para Metasploit-framework☆27Jun 4, 2025Updated 8 months ago
- A DDoS Attack Tool (not a real one but it can DDoS some websites).☆26Sep 25, 2022Updated 3 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆22Jun 30, 2024Updated last year
- ☆24Nov 18, 2023Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated last month
- first http brute force brute force any website we want☆30Dec 18, 2018Updated 7 years ago
- About Bruteforce attack on Facebook account using python script☆68Feb 7, 2025Updated last year
- ☆26Dec 15, 2023Updated 2 years ago
- Black-Tool v5.0.0 ⬛☆75Apr 4, 2024Updated last year
- ☆17Feb 18, 2026Updated last week
- rwwwshell: Getting a reverse shell with Mr. Robot ;)☆36Jul 16, 2020Updated 5 years ago
- Knowledge Manager Agent for Claude Code - Extract and organize content from web, PDF, social media to Obsidian/Notion☆27Updated this week
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆14Sep 28, 2024Updated last year
- #Just simple program to spoofing device by sending malicious link☆31Mar 1, 2022Updated 4 years ago
- Block excessive crawlers, bots and spiders traffic on your web site 👾☆34Jul 29, 2023Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆152May 17, 2024Updated last year
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- ☆10Nov 1, 2021Updated 4 years ago
- ☆38Updated this week
- ☆35Updated this week
- ☆11Sep 19, 2022Updated 3 years ago
- ☆26Jan 19, 2026Updated last month