Força bruta em formulários web.
☆19Feb 8, 2015Updated 11 years ago
Alternatives and similar repositories for Bruteforms
Users that are interested in Bruteforms are comparing it to the libraries listed below
Sorting:
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆27Jun 25, 2014Updated 11 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆89Nov 19, 2015Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- Android Phone FireWall , it could help you to filter the boring Message and unknow Call.☆13May 22, 2013Updated 12 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Jun 3, 2022Updated 3 years ago
- An android library through which users can add a customized loading dialog box with Lottie Animations.☆14Aug 29, 2022Updated 3 years ago
- One TCL. One smart eggdrop.☆21Feb 16, 2025Updated last year
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆74Jun 25, 2020Updated 5 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- Auto tools☆16Jul 2, 2024Updated last year
- cracked password☆20Oct 2, 2013Updated 12 years ago
- manage sim card contacts using PC/SC standard readers or SmartMouse/Phoenix serial reader☆20Sep 4, 2022Updated 3 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Jul 26, 2011Updated 14 years ago
- Exploit Wordpress Plugin Revolution Slider - Unrestricted File Upload☆25Nov 19, 2015Updated 10 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- ☆27May 6, 2025Updated 10 months ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- OTP BOSS is the most advanced and versatile OTP & SMS capture bot that is capable of getting OTP & SMS codes from victims by impersonatin…☆22Nov 21, 2021Updated 4 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- Fb cloning new commands☆21Oct 24, 2021Updated 4 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- ☆11Jun 8, 2022Updated 3 years ago