Ranginang67 / WSSView external linksLinks
gathering or searching websites that are vulnerable to sql injection ( GUI Tools )
☆33Dec 18, 2019Updated 6 years ago
Alternatives and similar repositories for WSS
Users that are interested in WSS are comparing it to the libraries listed below
Sorting:
- Simple tool to scanning sql injection vulnerability, easy to use!!☆14Oct 21, 2019Updated 6 years ago
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 3 years ago
- free web theme ready to your use☆13Mar 30, 2019Updated 6 years ago
- DirAttack tools, Search file or directory on website☆48Nov 7, 2019Updated 6 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- AOXdeface automatic deface many websites at once☆132Nov 20, 2023Updated 2 years ago
- M-dork, google dorking with mdork☆59Dec 3, 2018Updated 7 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Advanced payload generetor and multi handler☆37Dec 20, 2020Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- GitHubUserDataExtractor is a cross-platform Python tool designed to extract and display public GitHub user data both in the terminal and …☆22Sep 11, 2025Updated 5 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- ☆19Jul 23, 2021Updated 4 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 6 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated last year
- Linux installer stuffs☆11Aug 7, 2025Updated 6 months ago
- A Complete SubDomain Enumeration Tool☆25Oct 23, 2022Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- DPE - Default Password Enumeration☆36Jun 3, 2013Updated 12 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- This tool is used to send mail anonmously.☆14Sep 25, 2023Updated 2 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Piso wifi vendo trolling tool☆13Dec 14, 2023Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- beyawak tools, this tools for termux pentest☆57Jan 3, 2019Updated 7 years ago
- Reconnaisance Tool