PHP lab to test captcha bypassing
☆30Jan 8, 2024Updated 2 years ago
Alternatives and similar repositories for Captcha-Bypassing-Lab
Users that are interested in Captcha-Bypassing-Lab are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 7 months ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Spring4Shell reproduce☆11Apr 1, 2022Updated 3 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆13Aug 26, 2021Updated 4 years ago
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 3 weeks ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- Automatic SQL injector web-forum based CMS☆15Jan 2, 2022Updated 4 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆39Aug 9, 2023Updated 2 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 3 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- ☆11Jul 16, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Oct 29, 2022Updated 3 years ago
- Offensive Powershell obfuscator☆27Sep 6, 2024Updated last year
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- WhatsApp Bot with rich features☆13Aug 6, 2022Updated 3 years ago
- ☆12Oct 24, 2021Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- spring4shell | CVE-2022-22965☆23Jun 30, 2022Updated 3 years ago
- ☆12Sep 22, 2022Updated 3 years ago