☆18Sep 24, 2018Updated 7 years ago
Alternatives and similar repositories for Yuki-Chan-The-Auto-Pentest
Users that are interested in Yuki-Chan-The-Auto-Pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆10Nov 29, 2021Updated 4 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- ☆23Jan 29, 2023Updated 3 years ago
- Advanced Hash Password Decryptor.Auto detect hash🔥☆18May 5, 2021Updated 5 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- A framework for linking the DOM and DOM based events with scripting languages compiled to WASM. Part of the PyScript project.☆12Oct 1, 2024Updated last year
- A repository for business startups to grow their customers and marketing☆17Feb 4, 2025Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- Advanced Admin Finder Tool. More Than 800+ Admin Finder Dorks🔥☆13May 9, 2021Updated 5 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- GHHC-HACKBAR is an Advanced Web Penetration Testing Tool. Modified from Anon HackBar.☆14Jun 15, 2023Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- ☆10Apr 27, 2025Updated last year
- Vulnerability scanner☆14Jan 11, 2019Updated 7 years ago
- GILANG - TOOLKIT [ SIMPLE PENETRATION TESTING TOOLS]☆11May 27, 2021Updated 4 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- A powerful reverse shell generator☆47Mar 18, 2026Updated last month
- build your linux client for WhatsApp with Electron☆15Feb 16, 2020Updated 6 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆40Apr 23, 2025Updated last year
- BigEye6 is a Web Penetration Testing toolkit along with having some extra features and tools. It has more than 22 tools. Which has been d…☆12May 20, 2021Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A simple BOF (Beacon Object File) to search files in the system☆16Dec 2, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- M2 specializes in collecting information about locations in an easy and accurate way and getting ample information in less time.☆30Jun 18, 2022Updated 3 years ago
- Wordlists generated over the years of penetration testing☆13Mar 18, 2025Updated last year
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- Take down your target Telegram channels by this program☆13Nov 16, 2025Updated 5 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- alfa shell, alfa shell download, alfa shell txt, alfashell, alfa webshell☆16Jul 24, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year