X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
☆58Nov 11, 2023Updated 2 years ago
Alternatives and similar repositories for XAttacker
Users that are interested in XAttacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Th3_Monster Tool 2.5 ☣ Website Vulnerability Scanner & Auto Exploiter Bot ☣ .☆18Aug 11, 2018Updated 7 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- Anyform is a lightweight form brute-forcing tool.☆24Nov 17, 2018Updated 7 years ago
- Mystery of the Missing Samples☆25Mar 18, 2026Updated last week
- dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.☆20Mar 11, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A good tool to hide phishing traps or cut links.☆41Nov 29, 2023Updated 2 years ago
- A flask web app made for scanning vulnerabilites on a website, network exploitation, reconnaissance☆27Jan 16, 2023Updated 3 years ago
- White Hat Arsenal is a collection of very useful scripts, exploits and books.☆13Dec 4, 2019Updated 6 years ago
- Custom kernel with activated all Exynos 7580 Octa cores for Samsung Galaxy A3 (2016)☆12Jun 27, 2017Updated 8 years ago
- Get database configuration from websites using laravel☆11Nov 19, 2017Updated 8 years ago
- Helper tools for freebitco.in and freedoge.co.in multiple BTC☆11Sep 26, 2020Updated 5 years ago
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner☆756Dec 7, 2025Updated 3 months ago
- This Is PERL Script For Admin-Panel-Finder-Of-Any-Website☆16Nov 13, 2022Updated 3 years ago
- Tool For Frontal Camera Hack.☆62Nov 16, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Style for Termux and Kali tools. ( py )☆15Nov 29, 2021Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- My Nmap without root privileges! For hackers.☆44Jul 30, 2023Updated 2 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- India's first social network with chat messaging app.Switch from Foreign App to Indian Messenger to send and receive messages, calls, pho…☆18Sep 30, 2020Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- termux api usage☆14Apr 24, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12Nov 13, 2019Updated 6 years ago
- For reporting issues with Lolilith's Throne☆10Jun 25, 2025Updated 9 months ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆14Jan 10, 2020Updated 6 years ago
- WordPress Website Scanner Tool☆33Oct 13, 2025Updated 5 months ago
- ☆14May 9, 2023Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- Very Powerful and Easy Automated Web Scanner☆23Feb 2, 2021Updated 5 years ago
- A guide to using The State Decoded, whether deploying a site or using the data from one.☆13Apr 21, 2017Updated 8 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- ALL IN ONE Hacking Tool For Hackers☆24Feb 8, 2021Updated 5 years ago
- Termux-Fakeroot Untuk Pengguna Non Root☆16Nov 13, 2020Updated 5 years ago
- Developed a website to scan any web app. User enters the targeted URL in the website to find security vulnerabilities in the code and vis…☆16Feb 23, 2015Updated 11 years ago