DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incomplete installation and can be exploited, posing a security risk.
☆18Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for DeConfigro
Users that are interested in DeConfigro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆16Jan 29, 2025Updated last year
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Oct 17, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆29Oct 17, 2024Updated last year
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Dec 3, 2024Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 7 months ago
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆36Feb 4, 2026Updated last month
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆14Mar 2, 2026Updated 3 weeks ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Apr 12, 2025Updated 11 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Oct 17, 2024Updated last year
- DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was devel…☆20Nov 24, 2025Updated 3 months ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆27May 30, 2024Updated last year
- Build your own CNC machine☆14Jan 30, 2015Updated 11 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- Deploy IRC server using Docker☆13Dec 15, 2023Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Python 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/☆20Jun 23, 2023Updated 2 years ago
- IP tunneling with python☆15Oct 3, 2017Updated 8 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year
- Next-generation imageboard software. This software development project is independent from any image hosting project.☆10Dec 11, 2022Updated 3 years ago
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- ☆22Jan 29, 2025Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- Docker containers for yunohost☆11Aug 2, 2015Updated 10 years ago
- A web-based MPD client that uses Play! and Bootstrap☆37Mar 3, 2014Updated 12 years ago
- Expose 802.1x (e.g. eduroam) connection via second wifi (i.e. access point)☆18Jun 23, 2015Updated 10 years ago
- Python code and HTML template for running the Raspberry Pi based PiCam.☆23Mar 18, 2014Updated 12 years ago
- Gopher textboard☆12Jun 29, 2020Updated 5 years ago
- A bash script that can scan a target host or a list of target hosts looking for open/closed ports using netcat or telnet.☆14Feb 11, 2023Updated 3 years ago
- ☆22Oct 20, 2015Updated 10 years ago