gathering or searching websites that are vulnerable to sql injection ( GUI Tools )
☆33Dec 18, 2019Updated 6 years ago
Alternatives and similar repositories for WSS
Users that are interested in WSS are comparing it to the libraries listed below
Sorting:
- Simple tool to scanning sql injection vulnerability, easy to use!!☆14Oct 21, 2019Updated 6 years ago
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 3 years ago
- free web theme ready to your use☆13Mar 30, 2019Updated 6 years ago
- DirAttack tools, Search file or directory on website☆50Nov 7, 2019Updated 6 years ago
- Crypton: linux Pentester tools, penetration testing and ethical hacking☆66Dec 14, 2018Updated 7 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- AOXdeface automatic deface many websites at once☆134Nov 20, 2023Updated 2 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- M-dork, google dorking with mdork☆59Dec 3, 2018Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Advanced payload generetor and multi handler☆37Dec 20, 2020Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Linux installer stuffs☆11Aug 7, 2025Updated 6 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- A Complete SubDomain Enumeration Tool☆25Oct 23, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- A small Go program to read /var/log/audit/audit.log☆14Nov 12, 2018Updated 7 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- InstaSub adalah alat CLI berbasis Python untuk menjalankan misi Traodoisub dan menukar koin menjadi pengikut atau suka Instagram. Cocok u…☆11Aug 9, 2025Updated 6 months ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Piso wifi vendo trolling tool☆13Dec 14, 2023Updated 2 years ago