YoruYagami / EvilKaliLinks
download/Install all kali linux missing RTO/BBH tools
☆20Updated 10 months ago
Alternatives and similar repositories for EvilKali
Users that are interested in EvilKali are comparing it to the libraries listed below
Sorting:
- CVE Collection of jQuery UI XSS Payloads☆119Updated 2 years ago
- ☆64Updated 3 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 10 months ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆82Updated last year
- Automated OSINT on SwaggerHub☆170Updated last year
- ☆74Updated last year
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated 2 years ago
- Gmail/GSuite account enumeration tool☆51Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- simple recon tool to help you for searching vulnerability on web server☆73Updated 3 months ago
- External recon toolkit☆48Updated 5 months ago
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated last year
- D3Ext's Forward Shell☆120Updated last year
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆51Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 5 months ago
- All Type of Payloads☆137Updated last year
- Here Are Some Bug Bounty Resource From Twitter☆97Updated this week
- Collect XSS vulnerable parameters from entire domain.☆151Updated 2 years ago
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated 4 months ago
- ☆68Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Burp Suite Professional Edition .☆18Updated 6 months ago
- Inside403 is a powerful and versatile web security testing tool designed to assess the robustness of web pages and directories against 40…☆31Updated last year
- ☆57Updated last year
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆111Updated this week
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆149Updated 6 months ago
- CVE Collection of jQuery XSS Payloads☆71Updated 2 years ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆134Updated 3 weeks ago