Fast exploitation based on metasploit.
☆74Dec 28, 2019Updated 6 years ago
Alternatives and similar repositories for AutoXploit
Users that are interested in AutoXploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 0 day wp smtp exploit wordpress checker☆14Dec 24, 2020Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- A bash script that automates port scanning on specified target host(s). The aim of the scripts is reducing scan time, increasing scan eff…☆11Updated this week
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 10 months ago
- A simple python script that spams a message on WhatsApp☆31Aug 15, 2022Updated 3 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆55Jun 12, 2021Updated 4 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆197May 10, 2026Updated last week
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Nov 17, 2021Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- This Tool installing Metasploit☆14Sep 16, 2023Updated 2 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆25Oct 13, 2019Updated 6 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆62May 2, 2020Updated 6 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.0☆13Jan 17, 2020Updated 6 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆147Jul 12, 2020Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Auto Updater Joomla Components and Exploits Scanner☆27Apr 1, 2018Updated 8 years ago
- Automatted Purple Team Script☆30Oct 23, 2020Updated 5 years ago
- Embed a Metasploit Payload in an Original .Apk File☆120Mar 25, 2021Updated 5 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- A Panel for DDoS and DoS Goat (L4 & L7)☆10Feb 23, 2022Updated 4 years ago
- ☆63Sep 10, 2019Updated 6 years ago
- Instagram account information☆14Sep 18, 2022Updated 3 years ago