VoidSec / shopping-cartLinks
Shopping Cart is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Contains dozens of vulnerabilities; providing an easy-to-use …
☆24Updated 12 years ago
Alternatives and similar repositories for shopping-cart
Users that are interested in shopping-cart are comparing it to the libraries listed below
Sorting:
- Python Security/Hacking Kit☆48Updated 6 years ago
- Basic python script for detect airdroid users in lan☆48Updated 5 years ago
- Massive arsenal of hacker tools...☆78Updated 8 years ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆109Updated 7 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Updated 8 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 8 years ago
- website admin panel finder☆35Updated 5 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆43Updated 8 years ago
- Social Engineering Tool Oriented to facebook☆58Updated 8 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆89Updated 9 years ago
- A python tool that will extract exif data from picture with two methods☆38Updated 4 years ago
- Evil Twin Attack Bash script☆12Updated 9 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆37Updated 9 years ago
- Transparently Routing Traffic Through Tor☆64Updated last year
- Command line go0gle dorking tool☆139Updated 12 years ago
- A collection of scripts to run on a fresh install of kali linux☆36Updated 7 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Updated 11 years ago
- php-cli vulnerability scanner☆78Updated 10 years ago
- Android 802.11 pentesting tool☆96Updated 11 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- 💀 Subdomain - Searching Subdomain Of the site☆33Updated 7 years ago
- Information gathering tool - OSINT☆37Updated 6 years ago
- Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣☆36Updated 6 years ago