An advanced command-line search engine for Exploit-DB
☆16Sep 30, 2021Updated 4 years ago
Alternatives and similar repositories for hsploit
Users that are interested in hsploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An advanced graphical search engine for Exploit-DB☆120May 29, 2024Updated last year
- A general Javascript keylogger to be used in an XSS PoC☆18Feb 23, 2020Updated 6 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 months ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 months ago
- Collection of notes for talks☆13Jan 6, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Latex template based on the typographic memoir class for formatting PhD dissertations. Suitable for any areas but devised for computer sc…☆18May 14, 2012Updated 13 years ago
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- pathogen bundle of DrawIt plugin by DrChip☆11Sep 20, 2016Updated 9 years ago
- Auto powerful subdomains scanner - Auto check live subdomains☆18Jul 5, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Simple RAT in C#☆26Apr 11, 2020Updated 6 years ago
- My little polygon for common lisp adventures (games and experiments)☆18Jul 12, 2017Updated 8 years ago
- See more at:☆16Jun 3, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A compiler for the Meta Attack Language☆16Apr 11, 2022Updated 4 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- A proving grounds for young and aspiring BBOT modules☆15Apr 1, 2026Updated last month
- Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course☆16Dec 27, 2020Updated 5 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- ☆18Dec 8, 2022Updated 3 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- BPStegano is a steganography tool built using Python 3. It uses AES-128 encryption a custom LSB random pixel algorithm hiding to hide raw…☆26Feb 22, 2021Updated 5 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- D-RAT [VB.NET]+[MySQL]+[PHP]☆14Jun 10, 2020Updated 5 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- Trying to find unpublished leaks on solarleaks.net☆14Jan 14, 2021Updated 5 years ago
- A prototype server to swarm multiple DATs for Webrecorder☆14Apr 27, 2019Updated 7 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- webcomponent of echarts☆11Oct 29, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Mar 8, 2021Updated 5 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13May 31, 2015Updated 10 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Jan 20, 2023Updated 3 years ago
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- Minimal explained Gnuplot examples. Compiled outputs: http://www.cirosantilli.com/gnuplot-examples-gh-pages/☆18Jan 1, 2025Updated last year
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 7 years ago