baraalmasri / xerxesView external linksLinks
XERXES the most powerful DoS tool
☆36Sep 16, 2022Updated 3 years ago
Alternatives and similar repositories for xerxes
Users that are interested in xerxes are comparing it to the libraries listed below
Sorting:
- git clone https://github.com/zanyarjamal/xerxes☆15Aug 13, 2019Updated 6 years ago
- A Cross-Platform Telegam Members Scraping and Adding Tool☆10May 27, 2021Updated 4 years ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆15Apr 27, 2023Updated 2 years ago
- Deepfakes Software For All☆10Feb 21, 2020Updated 5 years ago
- Accurately Locate Smartphones using Social Engineering☆13Jun 3, 2020Updated 5 years ago
- Leaked SnapChat Camera Source code! Face detection, filters and more!☆21Aug 8, 2018Updated 7 years ago
- Denial of Service tool by ParzivalHack☆27Feb 6, 2025Updated last year
- A really simple and powerful DDOS Attack on python 🚀☆33Oct 14, 2024Updated last year
- ☆10Jul 16, 2024Updated last year
- MASS SPAMMER FOR CALLLLL☆30Nov 20, 2022Updated 3 years ago
- Domain Engineer or Domaineer is Semi-Auto Bot to gaining data from domains☆12Sep 25, 2025Updated 4 months ago
- ☆10Apr 18, 2019Updated 6 years ago
- THIS IS DDOS TOOL☆10Nov 20, 2021Updated 4 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- New phishing tool with 30+ templates updated tool☆10Feb 2, 2024Updated 2 years ago
- Distributed Denial of Service - Website Stress☆42Oct 13, 2024Updated last year
- Andiodine is a dns-tunneling solutions that allows you tunnel IPv4 data through a DNS server. This is very usable in different situations…☆12Apr 16, 2024Updated last year
- ☆13May 9, 2023Updated 2 years ago
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆12Nov 23, 2025Updated 2 months ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 2 years ago
- I DOC VIEW RCE 的poc☆13Nov 23, 2023Updated 2 years ago
- CLI tool to download images from Reddit☆15Sep 9, 2013Updated 12 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- A Python Script to find admin panel of a site☆10Apr 10, 2022Updated 3 years ago
- dorkX is a tool to do google dork in seconds and the results will be saved in results.txt☆10Oct 16, 2025Updated 3 months ago
- vulnerability that allows unauthorized control of an IP camera using the ONVIF protocol, The provided proof-of-concept code is capable c…☆12Apr 13, 2025Updated 10 months ago
- Python program for installing many tools automatically☆15Dec 31, 2021Updated 4 years ago
- Simple web API in php which takes as a parameter with GET requests to launch attacks with scripts present on the machine. There is also …☆11Mar 27, 2021Updated 4 years ago
- Arp Spoof and inject beef hook in seconds☆12Feb 2, 2014Updated 12 years ago
- A Firefox plugin that allows you to choose easily between different DNS over HTTPS servers☆12Apr 28, 2020Updated 5 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- X-wpbf is a wordpress bruteforce tool to find admin or user passwords via the admin login of the target website☆11Oct 16, 2025Updated 3 months ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Comprises of 5 ddos attack tools☆38Jan 29, 2023Updated 3 years ago