NSM-Barii / NetVuln-2.0Links
NetVuln 2.0 - As the Predeccessor to NetVuln 1.0 - This Newer program will not only be able to perform a port scan and subdomain scan but also a directory scan on all found subdomains, nmap-vulnerability scan, will also be able to query apis like - ipinfo, shodan, nvd, vulners, wpscan and cvecircl, All of this info will be saved & feed to Open…
☆15Updated 2 weeks ago
Alternatives and similar repositories for NetVuln-2.0
Users that are interested in NetVuln-2.0 are comparing it to the libraries listed below
Sorting:
- This program scrapes followers' usernames from a specified Instagram account!☆11Updated 3 years ago
- Tool to parse Stealer Logs.☆19Updated 2 years ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆28Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆20Updated 3 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆23Updated last year
- POC | Steal user WhatsApp information/data☆72Updated 3 months ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated 2 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Updated 3 years ago
- POC exploit for CVE-2015-10141☆30Updated 2 weeks ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- Bug Bounty ultimate tool☆22Updated 2 months ago
- inux based ransomware tool that can create a ransomware code for linux machine.☆10Updated 4 months ago
- BreachHunter is a powerful OSINT (Open Source Intelligence) tool designed for cybersecurity professionals, investigators, and ethical hac…☆11Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆31Updated 4 months ago
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Updated last year
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆89Updated 2 years ago
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆18Updated 4 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆23Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆50Updated 4 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- WordPress Sites Vulnerability Checker for CVE-2020-35489 - "Educational Use Only"☆10Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆110Updated 3 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open R…☆60Updated this week