[DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.
☆36Oct 7, 2019Updated 6 years ago
Alternatives and similar repositories for Kadabra
Users that are interested in Kadabra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local File Inclusion Exploitation Tool (mirror)☆127Feb 13, 2017Updated 9 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Simple Zeroconf/mDNS scanner written in Go with no external dependencies☆12Apr 20, 2021Updated 5 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- kadimus is a tool to check and exploit lfi vulnerability.☆569Aug 17, 2020Updated 5 years ago
- Hasherdotid☆11Jul 10, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- Record X11 keypress events to a log file☆27Mar 19, 2018Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Simple Process Hollowing in C#☆67Oct 23, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,939Apr 13, 2022Updated 4 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- Windows Privesc Check☆19May 20, 2014Updated 11 years ago
- ☆16May 9, 2016Updated 10 years ago
- The description is about to install WishFish tool in Android Termux. WishFish is very easy to hack webcam of your victims mobile.☆16Aug 4, 2020Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Linux information gathering and infrastructure scanner☆14Apr 12, 2019Updated 7 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆125Jun 22, 2018Updated 7 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Trying to be the best tool to search for exploits in the terminal.☆21Oct 23, 2022Updated 3 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 9 years ago
- ☆14Sep 22, 2019Updated 6 years ago