echo-devim / xbackdoorLinks
A tool for the persistent XSS exploitation with a focus for mobile web browsers
☆55Updated 4 years ago
Alternatives and similar repositories for xbackdoor
Users that are interested in xbackdoor are comparing it to the libraries listed below
Sorting:
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Password cracking utility☆54Updated 4 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- library and intepreter for penetration testing tools☆30Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- WeakNet PHP Execution Shell☆31Updated 10 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Search google for shellshock vulnerable sites☆27Updated 11 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- Search exploits in multiple exploit databases!☆85Updated 5 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- ☆54Updated 8 years ago