theahmadov / VOID
VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute force and other things... You have many choices. If you want to learn penetration , VOID may be a teacher for you. Because its open source code project. Please look VOID's source code and examine commands! And…
☆33Updated 2 years ago
Alternatives and similar repositories for VOID:
Users that are interested in VOID are comparing it to the libraries listed below
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 5 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- Information Gathering Simplified.☆64Updated 2 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Reverse And Dorking Tools☆25Updated 3 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- Dogma V1.5.3☆28Updated 5 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆44Updated 10 months ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆33Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- An OSINT tool to search for accounts by username in social networks.☆17Updated 2 years ago
- ☆12Updated 2 years ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆79Updated 2 years ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated last year
- Cracking protocols FTP and SSH.☆11Updated 8 months ago
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆36Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 8 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆35Updated 5 months ago
- Hacking with PasteJacking technique☆22Updated 9 months ago
- ☆27Updated 2 years ago