LasCC / QR-GeneratorLinks
Online test is available π
β12Updated 6 months ago
Alternatives and similar repositories for QR-Generator
Users that are interested in QR-Generator are comparing it to the libraries listed below
Sorting:
- YARA rule-based automation system to detect network attacks at byte-levelβ15Updated 4 years ago
- Python script that automate the process of generating various reverse shells.β16Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ18Updated 3 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generatβ¦β10Updated 5 years ago
- SSH brute-force script created for HackTheBoxβ17Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ18Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β40Updated 3 years ago
- Subdomain crawler with wordlist using pythonβ12Updated 5 years ago
- PHP lab to test captcha bypassingβ31Updated last year
- Cross Site Scripting ( XSS ) Vulnerability Payload Listβ23Updated 4 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reβ¦β18Updated 5 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocolβ36Updated 4 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.β29Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. Itβs a proxy-based tooβ¦β10Updated 4 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web applβ¦β26Updated this week
- Fast subdomains enumeration tool for penetration testersβ15Updated 5 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bountyβ43Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.β34Updated 2 weeks ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several lβ¦β33Updated 4 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday progβ¦β10Updated 2 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 wavesβ64Updated 6 years ago
- Better Google Dorking with Dorker.β33Updated 3 years ago
- π Help find Trojan Source vulnerability in code π . Useful for code review in project with multiple collaborators (CI/CD)β47Updated last year
- WebHook for Red Teamβ26Updated 4 years ago
- π Enumerate git repository URL from list of URL / User / Org. Friendly to pipelineβ59Updated 9 months ago
- This tool will help in generating reverse shells easily for all types of OS.β20Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Site fast fuzzing with chorme extension.β24Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzingβ24Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago