YoruYagami / EvilKali
download/Install all kali linux missing RTO/BBH tools
☆19Updated 7 months ago
Alternatives and similar repositories for EvilKali:
Users that are interested in EvilKali are comparing it to the libraries listed below
- CVE Collection of jQuery UI XSS Payloads☆118Updated 2 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆80Updated last year
- Collect XSS vulnerable parameters from entire domain.☆148Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆92Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆93Updated 6 months ago
- Automatic Web Vulnerability Scanner.☆40Updated 2 years ago
- Apache Tomcat exploit and Pentesting guide for penetration tester☆57Updated 2 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆24Updated 2 years ago
- ☆70Updated 2 years ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆109Updated this week
- Here Are Some Bug Bounty Resource From Twitter☆87Updated 3 weeks ago
- Bypass 403 pages☆107Updated 7 months ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 2 years ago
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆61Updated 9 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆66Updated 3 weeks ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆44Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆149Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆32Updated last year
- Inside403 is a powerful and versatile web security testing tool designed to assess the robustness of web pages and directories against 40…☆30Updated last year
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated 9 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated 11 months ago
- An automation tool to install the most popular tools for bug bounty or pentesting.☆121Updated 6 months ago
- Automated OSINT on SwaggerHub☆155Updated last year
- A Complete SSRF (Server Side Request Forgery) Scanner.☆31Updated 3 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆102Updated 2 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆48Updated 8 months ago
- Bypass Reset Password Code Lead to Account Takeover☆22Updated 5 months ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆56Updated last year