DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incomplete installation and can be exploited, posing a security risk.
☆19Mar 9, 2026Updated 2 months ago
Alternatives and similar repositories for DeConfigro
Users that are interested in DeConfigro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆13Sep 25, 2024Updated last year
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆20Nov 13, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆18Jan 29, 2025Updated last year
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆19Oct 17, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆33Oct 17, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆38Dec 3, 2024Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆11Jul 24, 2025Updated 9 months ago
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆40Feb 4, 2026Updated 3 months ago
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆14Mar 2, 2026Updated 2 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆16Jan 17, 2025Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆85Apr 12, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆149Jan 12, 2025Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆83Oct 17, 2024Updated last year
- DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was devel…☆25Mar 19, 2026Updated 2 months ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆28May 30, 2024Updated last year
- Build your own CNC machine☆14Jan 30, 2015Updated 11 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 3 years ago
- Deploy IRC server using Docker☆14Dec 15, 2023Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Apr 14, 2026Updated last month
- Python 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/☆20Jun 23, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- IP tunneling with python☆15Oct 3, 2017Updated 8 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- ☆22Jan 29, 2025Updated last year
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆22May 23, 2024Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 5 months ago
- Docker containers for yunohost☆11Aug 2, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A web-based MPD client that uses Play! and Bootstrap☆39Mar 3, 2014Updated 12 years ago
- Expose 802.1x (e.g. eduroam) connection via second wifi (i.e. access point)☆18Jun 23, 2015Updated 10 years ago
- Python code and HTML template for running the Raspberry Pi based PiCam.☆23Mar 18, 2014Updated 12 years ago
- Gopher textboard☆12Jun 29, 2020Updated 5 years ago
- A bash script that can scan a target host or a list of target hosts looking for open/closed ports using netcat or telnet.☆15Feb 11, 2023Updated 3 years ago