nicxlau / alfa-shell
Backdoor PHP shell script.
☆70Updated 9 months ago
Alternatives and similar repositories for alfa-shell:
Users that are interested in alfa-shell are comparing it to the libraries listed below
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆46Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated 11 months ago
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆53Updated 9 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Tool to create XSS PDF files☆49Updated 10 months ago
- Gecko Backdoor is a most powerful web php backdoor.☆118Updated 2 months ago
- acunetix-13 install in kali linux☆67Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆134Updated 6 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 7 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 8 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆105Updated 9 months ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆40Updated 3 years ago
- A simple Ransomware Generator☆48Updated 6 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆39Updated 8 months ago
- Bug Bounty ultimate tool☆19Updated 5 months ago
- a powerful script for find login [admin] pages !☆63Updated 6 months ago
- DragonForceWebshell☆42Updated last year
- #xss #xssfinder #xss-scanner #bugbounty #hacktool☆37Updated last year
- PrivacyNet: Privacy Network☆46Updated 7 months ago
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆23Updated 4 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 11 months ago
- A tool for automatically change the Tor IP address over time.☆79Updated 2 weeks ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆42Updated 8 months ago
- Nice list of google dorks for SQL injection☆126Updated 6 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 7 months ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Powerfull Automatic Sql injection Tools Pack☆111Updated 3 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 9 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆38Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆111Updated 4 months ago