X3RX3SSec / DVR_SploitLinks
Simple python3 script to automate CVE-2018-9995
☆11Updated last year
Alternatives and similar repositories for DVR_Sploit
Users that are interested in DVR_Sploit are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Updated last year
- PassBreaker☆65Updated last year
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆28Updated 4 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Updated last year
- Automated enumeration for red teamers☆10Updated 3 years ago
- Remote persistent keylogger for Windows and Linux..☆12Updated 3 years ago
- This is power full BotNet☆40Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated 4 months ago
- An Simple PHP Webshell Manager to bypassed security system☆22Updated last year
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆74Updated 9 months ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- Clipboard poisoning attack.☆57Updated 5 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆65Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hack…☆16Updated last month
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Updated 5 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆39Updated 4 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆62Updated 8 months ago
- A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.☆17Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year