Fast exploitation based on metasploit.
☆74Dec 28, 2019Updated 6 years ago
Alternatives and similar repositories for AutoXploit
Users that are interested in AutoXploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Ultimate Protocol Bruteforcer☆11Dec 25, 2019Updated 6 years ago
- Advanced deauthentication script.☆22Dec 17, 2019Updated 6 years ago
- Advanced Reconnaissance tool to enumerate attacking surface of the target.☆57Dec 22, 2019Updated 6 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 10 months ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Jun 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 9 months ago
- A simple python script that spams a message on WhatsApp☆31Aug 15, 2022Updated 3 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated 3 weeks ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆189Apr 1, 2026Updated last week
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Nov 17, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Web Vulnerability Scanner using Shell Script☆60Jun 29, 2022Updated 3 years ago
- Automated Wireless Attack Framework☆77Mar 18, 2019Updated 7 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Oct 13, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63May 2, 2020Updated 5 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Jan 25, 2022Updated 4 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.0☆13Jan 17, 2020Updated 6 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆147Jul 12, 2020Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Apr 1, 2018Updated 8 years ago