machine1337 / clickjackLinks
An efficient tool To Find click jacking vulnerabilities in easiest way with poc
☆25Updated 3 years ago
Alternatives and similar repositories for clickjack
Users that are interested in clickjack are comparing it to the libraries listed below
Sorting:
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Updated 2 years ago
- A small tool to find admin panel of the website☆14Updated 2 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆22Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆21Updated last year
- This tool is used to find the admin login page of a website.☆17Updated 4 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆14Updated 4 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- Dogma V1.5.3☆31Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆24Updated 4 years ago
- ☆10Updated 6 years ago
- A Simple Script For SSH BruteForce☆37Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆20Updated 3 years ago
- Reverse And Dorking Tools☆26Updated 4 years ago
- This is power full BotNet☆40Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆36Updated 3 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆52Updated 2 years ago
- Remote persistent keylogger for Windows and Linux..☆12Updated 3 years ago
- An OSINT tool to search for accounts by username in social networks.☆18Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated last year
- Information Gathering Simplified.☆70Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated last month
- Collect XSS vulnerable parameters from entire domain.☆13Updated 3 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 10 months ago