OffXec / TheDoc
TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!
☆98Updated 6 years ago
Alternatives and similar repositories for TheDoc:
Users that are interested in TheDoc are comparing it to the libraries listed below
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆61Updated 5 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆119Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Extreme Vulnerable Node Application☆93Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 4 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 5 years ago