machine1337 / clickjack
An efficient tool To Find click jacking vulnerabilities in easiest way with poc
☆21Updated 3 years ago
Alternatives and similar repositories for clickjack:
Users that are interested in clickjack are comparing it to the libraries listed below
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆27Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆30Updated 3 years ago
- A small tool to find admin panel of the website☆13Updated 2 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆19Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Encryptor and File Manager | bypass webshell upload☆30Updated 3 years ago
- A Simple Script For SSH BruteForce☆36Updated last year
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆16Updated 3 years ago
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- An OSINT tool to search for accounts by username in social networks.☆17Updated 2 years ago
- Automatic SQL injector web-forum based CMS☆11Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Dogma V1.5.3☆28Updated 5 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆20Updated last year
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Cracking protocols FTP and SSH.☆11Updated 7 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆13Updated last year
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆28Updated 3 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- crawl a website for links and expose all the vulnerable parameters.☆12Updated 2 years ago
- A tool that uses public proxies to find and scan sites for sql injection vulnerability.☆11Updated last month
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆9Updated 3 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago