Ranginang67 / WSS
gathering or searching websites that are vulnerable to sql injection ( GUI Tools )
☆35Updated 5 years ago
Alternatives and similar repositories for WSS:
Users that are interested in WSS are comparing it to the libraries listed below
- A very user friendly and advanced phishing toolkit made for hackers☆27Updated 3 years ago
- Automated Ip Tracking Tool☆26Updated last year
- Wordlist creator written in C to generate all possibilities of passwords☆19Updated 6 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 2 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆30Updated 3 years ago
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆38Updated 2 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆74Updated last month
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆22Updated 4 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Find usernames☆25Updated 4 years ago
- M-dork, google dorking with mdork☆56Updated 6 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- XDROID is android all in one hack tools☆33Updated 6 months ago
- 🔥Ready, Aim, Fire.🔥☆15Updated 2 years ago
- IP and geolocation tracking tool☆51Updated 4 months ago
- [Phishing Tool]☆16Updated 2 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆51Updated 4 years ago
- DirAttack tools, Search file or directory on website☆42Updated 5 years ago
- ☆33Updated 8 months ago
- A powerfull recon cat tool☆22Updated 10 months ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆65Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Updated 5 years ago
- Best social media phishing☆23Updated 4 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Updated 6 years ago
- Advanced payload generetor and multi handler☆36Updated 4 years ago
- M0B tool v2 : exploit - brute force - website informations gathering - dork scanner with 9 search engines - full ip ports scanner - shell…☆14Updated 6 years ago
- FBleaker will extract email from your facebook and try to find there password if they ever get leaked☆31Updated 4 years ago
- People Profiler (fake script)☆21Updated 4 months ago