cipherhexx / LazySQLi
Sqlmap for lazy people
☆15Updated 4 years ago
Alternatives and similar repositories for LazySQLi:
Users that are interested in LazySQLi are comparing it to the libraries listed below
- Steal telegram session Bypass 2fa☆16Updated 2 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆30Updated 3 years ago
- Okadminfinder rewrite by Xnuvers007☆17Updated 3 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆26Updated 6 years ago
- Complete Automated pentest framework for Information Gathering☆38Updated 5 years ago
- Encryptor and File Manager | bypass webshell upload☆29Updated 3 years ago
- ☆30Updated 8 years ago
- ☆26Updated 3 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalities☆47Updated last year
- ☆17Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆22Updated 4 years ago
- Find usernames☆24Updated 4 years ago
- Using open Adb ports we can exploit a Andriod Device☆20Updated 5 years ago
- Hacking Tools Z0172CK☆31Updated last year
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆37Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆50Updated 7 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆28Updated 6 years ago
- You can get cc from hear coded by cyber kallan☆19Updated 5 years ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆32Updated 3 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 5 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆26Updated 2 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆36Updated 2 years ago
- Tools for Pentesting that all hacker need....☆16Updated 2 years ago
- Hack any Instagram account through bruteforce.☆10Updated 3 years ago
- bring shell grabber a python bot which grab shells easily just by entering site list and it search for vulnerabilities as well as exploit…☆41Updated 3 years ago
- Jok3r - Network and Web Pentest Framework☆16Updated 5 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆37Updated 3 years ago
- Mini Wordress Exploiter using CVE2020☆31Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago