A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public
☆63Oct 7, 2021Updated 4 years ago
Alternatives and similar repositories for scarce-apache2
Users that are interested in scarce-apache2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Python3 port scanner☆15Dec 17, 2020Updated 5 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Sep 20, 2021Updated 4 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- This is the only script to bind payload in termux within a matter of seconds. Now has Port Forwarding feature☆16Jun 11, 2019Updated 6 years ago
- A GUI version of the PhoneSpoit CLI tool.☆18Jan 15, 2025Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- ./kumasia php simple backdoor☆23Jul 6, 2025Updated 8 months ago
- Realtek rtl8723de Ubuntu 18.04, 18.10 and older driver☆19Sep 27, 2025Updated 5 months ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Dec 18, 2016Updated 9 years ago
- Configure kali 2020.4 headless/headed for RPi4b☆15Jan 28, 2021Updated 5 years ago
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆39Oct 4, 2021Updated 4 years ago
- Enable Monitor mode & Packet Injection in Raspberry Pi☆26Nov 13, 2021Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 2 months ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- A very simple captive portal for WiFi networks using Flask and netfilter☆21Dec 7, 2016Updated 9 years ago
- ForkLineageOS manifest with modified stuff for Nethunter. WIP☆22Jan 1, 2021Updated 5 years ago
- Deep scan domain and find all possible domain to takeover☆17Apr 19, 2023Updated 2 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- Website☆12Jan 10, 2023Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64May 18, 2021Updated 4 years ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆67Nov 23, 2025Updated 4 months ago
- A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public☆371Jun 23, 2020Updated 5 years ago
- Just another manual about installing NetHunter on your mobile phone☆28Jan 8, 2020Updated 6 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆183Nov 22, 2021Updated 4 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Nov 25, 2022Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Kiss the annoying youtube ads goodbye!☆11Jan 30, 2025Updated last year
- ☆13Apr 19, 2019Updated 6 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 3 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- An Encrypted File transfer via AES-256-CBC☆53Apr 14, 2021Updated 4 years ago