Moham3dRiahi / XAttacker
X Attacker Tool โฃ Website Vulnerability Scanner & Auto Exploiter
โ1,612Updated last year
Alternatives and similar repositories for XAttacker:
Users that are interested in XAttacker are comparing it to the libraries listed below
- Automatically brute force all services running on a target.โ2,063Updated 8 months ago
- Th3Inspector ๐ต๏ธ Best Tool For Information Gathering ๐โ2,338Updated last year
- Advanced dork Search & Mass Exploit Scannerโ1,461Updated 8 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be usโฆโ740Updated 5 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulnsโ1,502Updated last year
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scannerโ703Updated last year
- An advanced multithreaded admin panel finder written in python.โ789Updated 11 months ago
- Find exploits in local and online databases instantlyโ1,726Updated 3 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.โ1,184Updated 2 years ago
- Reconnaissance Swiss Army Knifeโ1,894Updated 4 years ago
- Websploit is a high level MITM frameworkโ1,185Updated last year
- Generate Gmail Emailing Keyloggers to Windows.โ1,053Updated 2 years ago
- โ989Updated 2 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testersโ3,253Updated 8 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)โ912Updated 5 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exโฆโ949Updated 6 years ago
- Tool Information Gathering Write By Python.โ733Updated last year
- Information gathering tool - OSINTโ1,281Updated 3 years ago
- The New Hacking Frameworkโ699Updated 4 years ago
- Tools for Pentestingโ2,031Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy โฆโ1,154Updated 5 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoorโ2,325Updated 11 months ago
- [ Admin panel finder / Admin Login Page Finder ] ยขฯโัโ ะฒั ๐ป (โค-โค) ๐ปโ617Updated 2 months ago
- IP Tools To quickly get information about IP Address's, Web Pages and DNS records.โ488Updated 4 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.โ1,608Updated 4 months ago
- Verify if email existsโ377Updated 3 years ago
- Image Payload Creating/Injecting toolsโ1,230Updated last year
- SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghiโ1,672Updated last year
- Phishing Tool & Information Collectorโ4,306Updated 5 months ago
- Hacking systems with the automation of PasteJacking attacks.โ397Updated 6 months ago