[DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.
☆36Oct 7, 2019Updated 6 years ago
Alternatives and similar repositories for Kadabra
Users that are interested in Kadabra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local File Inclusion Exploitation Tool (mirror)☆127Feb 13, 2017Updated 9 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Simple Zeroconf/mDNS scanner written in Go with no external dependencies☆12Apr 20, 2021Updated 4 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆566Aug 17, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Hasherdotid☆11Jul 10, 2018Updated 7 years ago
- Record X11 keypress events to a log file☆27Mar 19, 2018Updated 8 years ago
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,921Apr 13, 2022Updated 3 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The description is about to install WishFish tool in Android Termux. WishFish is very easy to hack webcam of your victims mobile.☆16Aug 4, 2020Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- a client-only layer of protection from the wiretap/sniff/IDS analysis☆112Aug 25, 2017Updated 8 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Linux information gathering and infrastructure scanner☆14Apr 12, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Trying to be the best tool to search for exploits in the terminal.☆21Oct 23, 2022Updated 3 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- SHELL SCANNER☆21Apr 11, 2019Updated 6 years ago
- ☆18Feb 14, 2019Updated 7 years ago