Web-based GUI for TorBox
☆19Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for TorCI
Users that are interested in TorCI are comparing it to the libraries listed below
Sorting:
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- SendToXray - Burp Suite Extender, Send HTTP request to XRAY proxy.☆11May 22, 2021Updated 4 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Oct 3, 2021Updated 4 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆31Jan 18, 2022Updated 4 years ago
- The Syncthing website☆16Dec 1, 2025Updated 3 months ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- Youtube data extractor☆14Nov 2, 2023Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- delosNmap | Nmap Script☆38Jan 15, 2023Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆71Oct 2, 2023Updated 2 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- ✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications …☆66Mar 9, 2025Updated 11 months ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Apr 19, 2025Updated 10 months ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Oct 29, 2022Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago
- Information Gathering Simplified.☆77Jan 17, 2023Updated 3 years ago
- Personally developed tools for buffer overflow attacks☆24Sep 25, 2022Updated 3 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Base16 for Shells☆19Jun 30, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago