AI web vulneraribilty scanner ๐ค
โ20Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for Web-AI-Scanner
Users that are interested in Web-AI-Scanner are comparing it to the libraries listed below
Sorting:
- Payload Dropper with Persistance & Privesc & UAC bypass ๐ฑโ๐คโ14Apr 8, 2024Updated last year
- A web vulnerability scanner python script.โ22Apr 2, 2023Updated 2 years ago
- web based c2 ๐ดโโ ๏ธโ15Aug 10, 2024Updated last year
- ๐ญ Web Application Vulnerability Scanner ๐ญโ17May 21, 2022Updated 3 years ago
- Persistent Powershell backdoor tool {๐}โ120Jul 31, 2024Updated last year
- A flask web app made for scanning vulnerabilites on a website, network exploitation, reconnaissanceโ27Jan 16, 2023Updated 3 years ago
- Find any website vulnerability and bugs in few second.โ36Oct 1, 2020Updated 5 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion ๐ทโ86Feb 22, 2025Updated last year
- A web-based application that is a voice-based email system for visually impaired people. It is used to detect and process users' voices.โ17Nov 3, 2021Updated 4 years ago
- GENERATE PYTHON BASED FUD STUBโ19Nov 20, 2023Updated 2 years ago
- The Vulnerability Assessment ย project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using Nโฆโ18Mar 4, 2024Updated 2 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.โ14Feb 20, 2022Updated 4 years ago
- execute PE in memory Filelesslyโ52Feb 8, 2025Updated last year
- Automatically exported from code.google.com/p/pweb-suiteโ14Jun 8, 2016Updated 9 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for mโฆโ12Feb 1, 2022Updated 4 years ago
- Find secrets and passwords in container images and file systemsโ15Nov 16, 2022Updated 3 years ago
- ๐ ACS-auto-command-SQLMAP - ุงูุงุฏุงุฉ ุชุณุงุนุฏ ูู ุงุฎุชุตุงุฑ ุงูููุช ูุฃูุงู ุฑ SQLMAPโ16Jan 6, 2018Updated 8 years ago
- PathCoin (transfer bitcoin without network interaction) - proof of concept demonstrationโ10Nov 19, 2023Updated 2 years ago
- Developed a website to scan any web app. User enters the targeted URL in the website to find security vulnerabilities in the code and visโฆโ16Feb 23, 2015Updated 11 years ago
- โ11Mar 19, 2020Updated 6 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefuโฆโ16May 6, 2024Updated last year
- pArAnoIA - Tiny "Secure" Browserโ12Nov 2, 2024Updated last year
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single autoโฆโ26Jun 24, 2025Updated 8 months ago
- External recon toolkitโ55Dec 29, 2024Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUDโ39Nov 28, 2023Updated 2 years ago
- Black Hat Ethical Hacking | PHP Backdoor Shell v1.0โ19May 22, 2018Updated 7 years ago
- My personal MMRL/MRepo of Magisk Modules.โ23Updated this week
- This Tool is for web penetration Testing.โ21Jan 10, 2021Updated 5 years ago
- Javascript sourcemaps enumeration toolโ15Dec 19, 2024Updated last year
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perfโฆโ26May 1, 2022Updated 3 years ago
- go-utilsโ12Nov 22, 2025Updated 4 months ago
- Acunetix Professional v24.1โ19Mar 2, 2024Updated 2 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contractsโ35Dec 27, 2022Updated 3 years ago
- Simple Ransoware to attack Windows ๐โโ25Apr 19, 2023Updated 2 years ago
- Windows 10 PRO Activator - No more backdoors via loaders from China and neither you will need any crack anymore that is valid for a week โฆโ12Dec 22, 2018Updated 7 years ago
- my own 2fa bypass methodolgyโ27Sep 22, 2023Updated 2 years ago
- Blockchain-based counterfeit product detection system.โ20Jul 9, 2023Updated 2 years ago
- Install Burpsuite pro in Linux OSโ17Mar 24, 2024Updated last year
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thrโฆโ27Jan 8, 2024Updated 2 years ago