Web hacking framework with tools, exploits by python
☆392Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for web2attack
Users that are interested in web2attack are comparing it to the libraries listed below
Sorting:
- Fake-AP to perform Evil Twin Attack☆143Jul 29, 2018Updated 7 years ago
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 5 years ago
- Detect evil urls that uses IDN Homograph Attack.☆207Jan 24, 2018Updated 8 years ago
- Script that generates an Android App to hack SMS through WAN☆392Jan 15, 2025Updated last year
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Chrome Keylogger Extension | Post Exploitation Tool☆439Apr 26, 2022Updated 3 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆195Dec 21, 2018Updated 7 years ago
- [SUSPENDED PROJECT] aSYNcrone is a SYN Flood DDoS Tool! It has developed for educational purposes and gain knowledge on socket programmin…☆281May 11, 2024Updated last year
- Python Security/Hacking Kit☆48Nov 10, 2019Updated 6 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆523Dec 13, 2018Updated 7 years ago
- Instagram bruteforce exploit module☆815Mar 29, 2024Updated last year
- Inject malicious code into *.debs☆284Apr 26, 2022Updated 3 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆96Jun 15, 2018Updated 7 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- [ Automated Web Vulnerability Scanner ]☆72Jul 12, 2020Updated 5 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆99Dec 18, 2018Updated 7 years ago
- tools which can be used by forensics experts and ethical hackers☆182Apr 28, 2016Updated 9 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆280May 13, 2018Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Verify if email exists☆409Dec 31, 2021Updated 4 years ago
- Intelligent login bruteforcer.☆908Apr 27, 2023Updated 2 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix☆1,697Oct 8, 2021Updated 4 years ago
- Hijack services that relies on QR Code Authentication.☆271Dec 20, 2023Updated 2 years ago
- Bluetooth Honeypot☆266Jan 2, 2021Updated 5 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Dec 17, 2015Updated 10 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- Python wordlist generator☆181Apr 26, 2022Updated 3 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆749Sep 1, 2022Updated 3 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Simple Remote Access Trojan Tool☆235Feb 18, 2022Updated 4 years ago