spyboy-productions / PhantomCrawler
Boost website hits by generating requests from multiple proxy IPs.
☆66Updated last year
Alternatives and similar repositories for PhantomCrawler
Users that are interested in PhantomCrawler are comparing it to the libraries listed below
Sorting:
- Nmap & SQL injection automation tool☆34Updated 7 months ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆38Updated 7 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year
- PassBreaker☆61Updated last year
- Dogma V1.5.3☆30Updated 5 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 11 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆40Updated 2 years ago
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- Bypass 403☆144Updated 2 months ago
- A Simple Script For SSH BruteForce☆36Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆22Updated 9 months ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆49Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆105Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- Find Email Spoofing Vulnerablity of domains☆94Updated 9 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 2 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆38Updated 5 months ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated 2 years ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆70Updated last year