emadshanab / Tor-IP-Changer
☆14Updated 2 years ago
Related projects: ⓘ
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated last year
- ☆15Updated 8 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆28Updated 8 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 9 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆38Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆23Updated 11 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆15Updated last year
- ☆19Updated this week
- Recon scripts for Red Team and Web blackbox auditing☆29Updated 7 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- Automated HTTP Request Repeating With Burp Suite☆33Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- Tools used for Pentesting☆22Updated last year
- Subdomains scanner Spider☆13Updated 6 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated 10 months ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆19Updated 3 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆24Updated 11 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆31Updated 11 months ago
- ProxyChecker Made in NodeJS☆36Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆28Updated 2 months ago
- ☆18Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆31Updated last year
- A BurpSuite extension for vulnerability Scanning☆24Updated 7 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 7 months ago
- Fast Path Traversal exploitation tool☆21Updated 5 months ago