Automated NoSQL database enumeration and web application exploitation tool.
☆25May 6, 2019Updated 7 years ago
Alternatives and similar repositories for NoSQLMap
Users that are interested in NoSQLMap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jan 2, 2020Updated 6 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 3 months ago
- Simple RAT in C#☆26Apr 11, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Simple but sharp ransomware☆38Jul 11, 2020Updated 5 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- A general Javascript keylogger to be used in an XSS PoC☆18Feb 23, 2020Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆55Jun 12, 2021Updated 4 years ago
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated 2 months ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆143Oct 3, 2023Updated 2 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆43Dec 2, 2020Updated 5 years ago
- This is an amazing tool using which you can download all tools for termux.☆39Sep 12, 2022Updated 3 years ago
- ☆26Aug 19, 2024Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Human Oriented SHell☆31May 13, 2026Updated last week
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 11 months ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution☆74Oct 9, 2020Updated 5 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆25Oct 13, 2019Updated 6 years ago
- Unicode encoding attacks with machine learning☆97Nov 25, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago