Loubaris / scrapeawLinks
ScrapeAW is a framework that without API scrape IPs across the world using Shodan
☆11Updated last year
Alternatives and similar repositories for scrapeaw
Users that are interested in scrapeaw are comparing it to the libraries listed below
Sorting:
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated 2 years ago
- Monitor your target continuously for new subdomains!☆24Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆28Updated last year
- ☆43Updated 6 months ago
- my own 2fa bypass methodolgy☆25Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Tool for scanning domains for .git directories.☆16Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆20Updated this week
- ☆13Updated 7 months ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated this week
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Updated 2 years ago
- ☆13Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- ☆19Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated last month
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Argument injection vulnerability in PHP☆12Updated last year
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆20Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- An offensive security framework for writing payloads☆18Updated 3 years ago