Highly configurable script for dictionary/spray attacks against online web applications.
☆53Nov 8, 2022Updated 3 years ago
Alternatives and similar repositories for Klyda
Users that are interested in Klyda are comparing it to the libraries listed below
Sorting:
- ☆13Dec 21, 2023Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆48Nov 9, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 2 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆97Nov 15, 2022Updated 3 years ago
- Various wordlists for bruteforce☆36Nov 9, 2021Updated 4 years ago
- ☆36Apr 24, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆97Jul 30, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- Your template-based BloodHound terminal companion tool☆446Jan 21, 2026Updated 2 months ago
- Top 120 million of most probable passwords used by russian-speaking users☆32Nov 2, 2022Updated 3 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆178Jan 22, 2025Updated last year
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated 10 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Sep 29, 2022Updated 3 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆16Jun 30, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 2 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- An XSS Exploitation Tool☆337Dec 5, 2025Updated 3 months ago