⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
☆14Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for WebHackersWeapons
Users that are interested in WebHackersWeapons are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- huntr.dev public disclosures/hacktivity watcher☆17Nov 5, 2023Updated 2 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago
- BugBuntu Linux☆15May 21, 2021Updated 4 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impers…☆163Mar 2, 2022Updated 4 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- @wifi.id Account Extractor & Checker☆24May 24, 2018Updated 7 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- 🚀 The easiest way to automate building and releasing your iOS and Android apps☆11Updated this week
- ☆27Jul 27, 2024Updated last year
- Arduino library for the Adafruit FONA☆16Jul 14, 2015Updated 10 years ago
- Magisk module to disable WiFi 5Ghz Band on your Qualcomm device☆14Oct 29, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- 📖 Official documentation for Mainsail — setup guides, configuration, and resources for the Klipper 3D printer web interface.☆16Mar 15, 2026Updated 2 weeks ago
- A tool to update the virus definitions of Kaspersky Rescue Disk 18 & 24 | Only for Windows right now☆19Jan 5, 2025Updated last year
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- A collection of several hundred online tools for OSINT☆22Sep 27, 2024Updated last year
- Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. …☆16Jan 8, 2021Updated 5 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 5, 2023Updated 2 years ago
- when i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This r…☆62Feb 17, 2018Updated 8 years ago
- [Script and Docker 🐳] OpenConnect (Cisco AnyConnect) VPN Server (OCServ) script one key easy configurator and installer☆21May 29, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆15Sep 8, 2020Updated 5 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- An all-in-one repository for setting up a new VM with tools for bug bounty hunting, Android app testing, browser configuration, logging, …☆23Jun 25, 2025Updated 9 months ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Linux/macOS random/vendor MAC-address changer.☆16Mar 20, 2022Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A curated list of cryptography resources and links.☆20Jun 8, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- 本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and pu…☆16Mar 5, 2026Updated 3 weeks ago
- collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bot…☆10Apr 24, 2021Updated 4 years ago
- Browser interface to Telegram's API with additional modules for generating datasets and network graphs☆13Dec 31, 2023Updated 2 years ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago