XSHOCK Shellshock Exploit
☆89Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for XSHOCK
Users that are interested in XSHOCK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mail extractor with your dork☆22Jan 27, 2021Updated 5 years ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- #xss #xssfinder #xss-scanner #bugbounty #hacktool☆38Jan 7, 2024Updated 2 years ago
- XCTR Hacking Tools☆41Aug 4, 2021Updated 4 years ago
- Xss Payload Generator ~ Xss Scanner ~ Xss Dork Finder☆602Jul 25, 2023Updated 2 years ago
- #crypto #cipher #encode #decode #hash☆52Mar 27, 2021Updated 4 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Dec 16, 2020Updated 5 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- Automated XSS Finder☆63Aug 7, 2013Updated 12 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆31Jan 12, 2014Updated 12 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Arkhota, a web brute forcer for Android.☆19Feb 15, 2023Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Jan 8, 2019Updated 7 years ago
- Lfi Scan Tool☆108May 16, 2023Updated 2 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- ☆25Aug 11, 2020Updated 5 years ago
- Simple Spyder BOT Auto Exploit Mass Local File Disclosure Joomla ( Fix Speed ) <3☆10Nov 5, 2019Updated 6 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 2 months ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Tools for information gathering☆355May 20, 2024Updated last year
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago
- This Burp Suite extension allows you to customize header with put a new header into HTTP REQUEST BurpSuite (Scanner, Intruder, Repeater, …☆53Mar 29, 2023Updated 2 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- A simple script to generate a hidden url for social engineering.☆122Aug 11, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- C# Admin Control Panel Finder For Windows☆46Sep 23, 2019Updated 6 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Oct 4, 2017Updated 8 years ago