nicxlau / alfa-shell
Backdoor PHP shell script.
☆69Updated 6 months ago
Alternatives and similar repositories for alfa-shell:
Users that are interested in alfa-shell are comparing it to the libraries listed below
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆42Updated last year
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆45Updated 6 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 4 months ago
- a powerful script for find login [admin] pages !☆56Updated 3 months ago
- Tool to create XSS PDF files☆40Updated 7 months ago
- Gecko Backdoor is a most powerful web php backdoor.☆111Updated 3 weeks ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated 8 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆20Updated last year
- A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports☆13Updated last month
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆38Updated 2 years ago
- steal chrome saved passwords "undetectable"☆50Updated 2 years ago
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆24Updated 4 years ago
- Web Exploit here ! advanced web hacking and hacker toolkit in your hands☆34Updated 5 months ago
- acunetix-13 install in kali linux☆57Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 6 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆101Updated 6 months ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆26Updated last month
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆36Updated 5 months ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆65Updated 4 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆127Updated 3 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆33Updated 5 months ago
- Ultimate Google Dork Lists OSWP top 10☆51Updated 5 months ago
- control windows computeur from telegram☆64Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆37Updated 4 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆84Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆61Updated 8 months ago
- Powerfull Automatic Sql injection Tools Pack☆111Updated 3 years ago
- Hackerinfo infromations Web Application Security☆69Updated last year
- simple recon tool to help you for searching vulnerability on web server☆73Updated last week