tegal1337 / ShellyLinks
Simple Backdoor Manager with Python (based on weevely)
☆95Updated 8 months ago
Alternatives and similar repositories for Shelly
Users that are interested in Shelly are comparing it to the libraries listed below
Sorting:
- Wi-Fi Exploit Tool☆51Updated 5 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆31Updated 6 years ago
- | FazScan is a Perl program to do some vulnerability scanning and pentesting |☆83Updated 6 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 6 years ago
- XSHOCK Shellshock Exploit☆87Updated 2 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalities☆48Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆55Updated 3 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Mini Wordress Exploiter using CVE2020☆31Updated 4 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆35Updated 4 years ago
- Hacking Tools Z0172CK☆31Updated 2 years ago
- This contain havij latest version cracked☆57Updated 2 years ago
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆58Updated 7 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆39Updated 7 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆62Updated 5 months ago
- Complete Automated pentest framework for Information Gathering☆45Updated 5 years ago
- ☆17Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- ☆23Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆78Updated 2 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- [ Automated Web Vulnerability Scanner ]☆74Updated 5 years ago
- Ultimate Recon Software for Information Gathering☆97Updated 5 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago
- SQLi Google Dork Scanner☆59Updated 3 years ago
- Web Application Vulnerability Scanner☆126Updated 5 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- Dorks Hacking Database for educational proposal☆87Updated 4 years ago