The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability description, or a bug writeup on Medium, or a public report on Hackerone!
☆11Jan 2, 2021Updated 5 years ago
Alternatives and similar repositories for bugscraper
Users that are interested in bugscraper are comparing it to the libraries listed below
Sorting:
- Download Youtube Video's in Both MP3 & MP4 format! | Multi video's + playlist Downloader Support☆10Nov 28, 2020Updated 5 years ago
- Powerful, unbearable DDoS Tool☆12Feb 7, 2021Updated 5 years ago
- For Spamming | BOT (Spam anywhere) or in Social Media Comment Section!☆12Jan 1, 2021Updated 5 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆16Oct 26, 2020Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Nov 10, 2020Updated 5 years ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆28Jul 23, 2021Updated 4 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆16Nov 7, 2020Updated 5 years ago
- Check For Valid Emails in Bulk!☆13Nov 17, 2020Updated 5 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- Make Your Passwords Cracking easier! Crack any kinda pwds within just few minutes!!☆19Oct 26, 2020Updated 5 years ago
- Advance OTP Bypass Tool. Termux Supported.☆116Feb 23, 2026Updated 3 weeks ago
- This Tool is a Powerful dos & ddos Tool to create heavy load on the Servers, exhausting the resources thus, making web servers nonrespon…☆22Oct 26, 2020Updated 5 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆57Jun 8, 2021Updated 4 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Powerful windows malware with many features☆17Mar 10, 2024Updated 2 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- i2p router implementation in C11☆11Nov 14, 2017Updated 8 years ago
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆35Nov 29, 2025Updated 3 months ago
- Python-based vulnerability detection tool for web applications☆18Jul 31, 2024Updated last year
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆16Oct 25, 2024Updated last year
- ☆24Nov 18, 2023Updated 2 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- CloudFlare bypass, Breacher, FindPerson, GeneratorIP☆37Apr 9, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago