iniqua / plecostView external linksLinks
Plecost - Wordpress finger printer Tool
☆347Mar 1, 2023Updated 2 years ago
Alternatives and similar repositories for plecost
Users that are interested in plecost are comparing it to the libraries listed below
Sorting:
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Advanced Web Shell☆579May 1, 2017Updated 8 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 9 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- OWASP VBScan is a Black Box vBulletin Vulnerability Scanner☆328Jun 16, 2019Updated 6 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- A GPL fork of the popular wordpress vulnerability scanner WPScan☆214Aug 23, 2019Updated 6 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- minimal script to help find script into the nse database☆133Jul 10, 2018Updated 7 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- WebApp Information Gatherer☆551May 29, 2018Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Passive Vulnerability Auditor☆136Jul 26, 2016Updated 9 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- WPScan rewritten in Python + some WPSeku ideas☆651Jun 4, 2021Updated 4 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Wordpress Attack Suite☆973Feb 16, 2021Updated 4 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Automated digital reconnaissance☆203Dec 8, 2022Updated 3 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- powerful auto-backdooring utility☆748Dec 20, 2017Updated 8 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆298Jun 25, 2015Updated 10 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆224Oct 16, 2023Updated 2 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- SQL Injection Exploitation Tool☆806Jan 4, 2019Updated 7 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Aug 26, 2020Updated 5 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago