Whomrx666 / deface-XLinks
deface-X is an automatic deface tool used to inject a website
☆13Updated 3 months ago
Alternatives and similar repositories for deface-X
Users that are interested in deface-X are comparing it to the libraries listed below
Sorting:
- Xnow-ip is a tool created to find out the IP address of a website, suitable for those of you who are just learning hacking.☆14Updated 3 months ago
- X-hydra Mini-ToolKit login cracker which supports numerous protocols to attack On Termux. It is very fast and flexible, and new modules a…☆15Updated 3 months ago
- X-wpbf is a wordpress bruteforce tool to find admin or user passwords via the admin login of the target website☆11Updated 3 months ago
- Xsqli-scanner, a powerful and efficient tool designed to identify SQL Injection vulnerabilities in websites. Built with a multi-threading…☆18Updated 3 months ago
- satanX-flood is a DDOS tool that is used to flood a website using the IP address☆19Updated 3 months ago
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆18Updated 3 months ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Updated 3 months ago
- X-ddos666 is a Insane DDOS tool with HTTP/HTTPS PROXY REQUIREMENT {OVER 500 IP PROXY}☆13Updated 3 months ago
- xhackTool is a tool that helps you to install and use multiple penetration testing and hacking tools on Android system with ease.☆30Updated 3 months ago
- This is a simple tool to automatically deface vulnerable websites☆12Updated 3 months ago
- Cyberpunx is the most complete hacking tool and can be run on Termux or Kali Linux with various very useful features and has been proven …☆33Updated 3 months ago
- X-fucknet is the best tool with full power to carry out DDOS attacks {Distributed Denial of Service}☆12Updated 3 months ago
- Admin finder is a tool that serves to find the login page of a website.☆13Updated 3 months ago
- Xphisher is a tool for carrying out phishing easily and practically and is suitable for beginners because it is very dangerous if misused…☆29Updated last month
- Socialbrute is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Mr.X {Updated 2025}☆31Updated last month
- dorkX is a tool to do google dork in seconds and the results will be saved in results.txt☆10Updated 3 months ago
- doxxerX is A tool that integrates the collection of various tools, techniques and sources of information, making it easier to doxx.Everyt…☆40Updated last month
- Dos-attacX is a framework designed for educational purposes to simulate a single-machine attack on a target's server. This tool sends con…☆15Updated 3 months ago
- Track-Ripper is a simple tool that can be used to track someone easily which can be used to track fraudsters or other criminals☆32Updated last month
- exploit-X Create Android Ransomware In Termux (NO ROOT). This Tool automate task of create the android ransomware apk with encryption key…☆28Updated 3 months ago
- Xdeauth-wifi is a tool used to carry out DDOS attacks on a WiFi or is usually called a WiFi deauther☆15Updated 3 months ago
- This is a tool for searching or osint on Instagram to find target information☆69Updated 3 months ago
- A powerfull recon cat tool☆29Updated 2 months ago
- whomrx-dosX is a ddos tool that sends a number of packets to the target server until it goes down☆13Updated 3 months ago
- X-overdos is a A tool for performing DoS attack tests with many methods such as Layer 2, Layer 4, and also Layer 7.☆10Updated 3 months ago
- X-brute is a tool designed to perform brute force using auto tor to trick the system so that it can continue to run and perform brute for…☆19Updated 3 weeks ago
- Hack-camera is a tool used to carry out attacks using social engineering, namely sending a trap link to trap the target and taking photos…☆16Updated last month
- Infect Android devices by sending links to targets☆52Updated 3 months ago
- X-GET INFO - Simple Information Toolkit☆13Updated 3 months ago
- This is a tool for sending a Trojan virus to the victim's cellphone using the victim's telephone number on the victim's cellphone☆55Updated 3 months ago