muodov / sqlmapchik
cross-platform sqlmap GUI aimed to mobile devices
☆49Updated 8 years ago
Alternatives and similar repositories for sqlmapchik:
Users that are interested in sqlmapchik are comparing it to the libraries listed below
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Try various exploits to get root☆19Updated 11 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 4 years ago
- A web app scanner☆26Updated 11 years ago
- Automatically exported from code.google.com/p/hexorbase☆69Updated 7 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- old website files☆10Updated 8 years ago
- ☆78Updated 5 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- async web crawler☆26Updated 10 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- SSH Based Remote Administration Tool☆104Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- Download exploits from exploit-db.com☆43Updated 9 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- a GUI for Sqlmap written in python☆38Updated 10 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- ☆47Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago