drcrypterdotru / Zeus-Grabber
Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H
☆27Updated 3 months ago
Alternatives and similar repositories for Zeus-Grabber:
Users that are interested in Zeus-Grabber are comparing it to the libraries listed below
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆53Updated 11 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated 2 weeks ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- ZeroShell Manager (GUI) is a Tool designed to help users manage their Webshells☆11Updated 4 months ago
- Mass Exploit for CVE 2022-29464 on Carbon☆18Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆102Updated last year
- PassBreaker☆55Updated 9 months ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆23Updated last year
- Dogma V1.5.3☆30Updated 4 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- Steal Telegram Session bypass 2fa using powershell script☆80Updated 2 weeks ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆13Updated 7 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 4 months ago
- A Simple Script For SSH BruteForce☆36Updated last year
- Perform With Massive Wordpress Enumeration☆12Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆22Updated last year
- UAdmin Phishlets for common sites☆13Updated 2 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆26Updated last month
- Hacking with PasteJacking technique☆20Updated 6 months ago
- Clipboard poisoning attack.☆55Updated 4 years ago