aziz0x48 / xSMTP
xSMTP π¦ Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.
β65Updated last year
Related projects β
Alternatives and complementary repositories for xSMTP
- vMass Bot Vulnerability Scanner & Auto Exploiter Tool Written in Perl.β174Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search β¦β22Updated 3 weeks ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSecβ56Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV'sβ32Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.β45Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proceβ¦β23Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generatorβ15Updated 2 years ago
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.β178Updated last year
- Generate Undetectable Metasploit Payload in a simple wayβ36Updated 11 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β119Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.β38Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 APIβ41Updated 6 months ago
- OpenSSH 9.1 vulnerability mass scan and exploitβ8Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.β62Updated 2 years ago
- β20Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data andβ¦β25Updated 7 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whicβ¦β38Updated 2 years ago
- Mass Exploit for CVE 2022-29464 on Carbonβ18Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.β51Updated 8 months ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )β22Updated last year
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.β12Updated 3 months ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipeβ¦β40Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ20Updated 2 years ago
- SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.β88Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, aβ¦β21Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotalβ71Updated last year
- Ultimate Google Dork Lists OSWP top 10β49Updated 3 months ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber β¦β58Updated last year