Human and machine readable web vulnerability testing format
☆195Sep 19, 2022Updated 3 years ago
Alternatives and similar repositories for explo
Users that are interested in explo are comparing it to the libraries listed below
Sorting:
- A blind SQL injection module that uses bitshfting to calculate characters.☆132Aug 7, 2022Updated 3 years ago
- Version 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).☆407Mar 24, 2019Updated 6 years ago
- Damn Small SQLi Scanner☆868Jan 1, 2025Updated last year
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- SQL Injection Exploitation Tool☆808Jan 4, 2019Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- SQL Vulnerability Scanner☆980Jan 11, 2018Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Inject malicious code into *.debs☆284Apr 26, 2022Updated 3 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆177Jul 29, 2017Updated 8 years ago
- OWASP VBScan is a Black Box vBulletin Vulnerability Scanner☆328Jun 16, 2019Updated 6 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆116Jun 28, 2018Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- jSQL Injection is a Java application for automatic SQL database injection.☆1,741Updated this week
- A fast and powerfull dashboard (admin) finder☆239Nov 20, 2018Updated 7 years ago
- Tulpar - Web Vulnerability Scanner☆200Dec 8, 2019Updated 6 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Advanced reconnaissance utility☆994Nov 20, 2023Updated 2 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆526Oct 24, 2017Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆48Dec 8, 2022Updated 3 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- massive SQL injection vulnerability scanner☆1,229Aug 14, 2018Updated 7 years ago