Phamchie / varsqli
☆14Updated last year
Alternatives and similar repositories for varsqli
Users that are interested in varsqli are comparing it to the libraries listed below
Sorting:
- PassBreaker☆61Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated 10 months ago
- POC | Steal user WhatsApp information/data☆63Updated last week
- Tool for automate bug hunting process 🔍 --> 🍭☆40Updated 9 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆34Updated this week
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 10 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆45Updated 10 months ago
- xdebug 2.5.5 RCE exploit☆30Updated 4 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Automatic tool to find Google Dorks☆35Updated 6 months ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- POC Pdf-exploit builder on C#☆135Updated last year
- Nmap & SQL injection automation tool☆34Updated 7 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆73Updated 2 weeks ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆59Updated last month
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Sifter - All purpose penetration testing op-center☆75Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated this week
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 8 months ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆67Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- This Discord Rat give you the best way to control victims pc on discord.☆15Updated 4 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 11 months ago