A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public
☆63Oct 7, 2021Updated 4 years ago
Alternatives and similar repositories for scarce-apache2
Users that are interested in scarce-apache2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Python3 port scanner☆15Dec 17, 2020Updated 5 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Sep 20, 2021Updated 4 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is the only script to bind payload in termux within a matter of seconds. Now has Port Forwarding feature☆16Jun 11, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providin…☆26Jul 23, 2022Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆25Feb 25, 2022Updated 4 years ago
- Realtek rtl8723de Ubuntu 18.04, 18.10 and older driver☆19Sep 27, 2025Updated 6 months ago
- Second Edition Metasploit For Termux☆21Updated this week
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆37Dec 18, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Configure kali 2020.4 headless/headed for RPi4b☆15Jan 28, 2021Updated 5 years ago
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆39Oct 4, 2021Updated 4 years ago
- Enable Monitor mode & Packet Injection in Raspberry Pi☆26Nov 13, 2021Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- A very simple captive portal for WiFi networks using Flask and netfilter☆21Dec 7, 2016Updated 9 years ago
- ForkLineageOS manifest with modified stuff for Nethunter. WIP☆22Jan 1, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Deep scan domain and find all possible domain to takeover☆17Apr 19, 2023Updated 2 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 6 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- Localroot Privelege escalation for linux☆13Aug 5, 2024Updated last year
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64May 18, 2021Updated 4 years ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆67Nov 23, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆95Aug 4, 2023Updated 2 years ago
- A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public☆374Jun 23, 2020Updated 5 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- Just another manual about installing NetHunter on your mobile phone☆28Jan 8, 2020Updated 6 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Nov 22, 2021Updated 4 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Nov 25, 2022Updated 3 years ago