tiankonguse / themoleLinks
Mole is an automatic SQL Injection exploitation tool. clone from sourceforge
☆52Updated 8 years ago
Alternatives and similar repositories for themole
Users that are interested in themole are comparing it to the libraries listed below
Sorting:
- archive of code from http://www.unicornscan.org/☆79Updated 13 years ago
- A Blind SQL Exploitation application☆79Updated 13 years ago
- fork of http://code.google.com/p/dnsmap/source/checkout☆115Updated 8 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- Nikto for Windows with some extra features.☆183Updated 8 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆267Updated 5 years ago
- MassBleed SSL Vulnerability Scanner☆244Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆208Updated last year
- Does some google dorks against a domain☆167Updated 5 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- ☆232Updated last year
- A modular recon tool for pentesting☆259Updated 7 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆172Updated last month
- Getting BlindElephant into a working state, and updating the plugin files☆80Updated 5 years ago
- Maltego Penetration Testing Transforms☆373Updated 5 years ago
- Drag and Drop ClickJacking PoC development assistance tool.☆196Updated 5 years ago
- Tools that are related to pentest and network security☆97Updated 4 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆162Updated 7 years ago
- Load balancer detection tool. Moved to https://git.sr.ht/~jmbr/halberd☆89Updated 8 years ago
- A unified console to perform the "kill chain" stages of attacks.☆205Updated 2 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆293Updated 10 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- DMitry (Deepmagic Information Gathering Tool)☆228Updated last year
- Python script to crack hashes using online services☆89Updated 4 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆208Updated 6 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆97Updated this week
- WPSploit - Exploiting Wordpress With Metasploit☆228Updated 7 years ago
- A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.☆159Updated 4 years ago
- Program to perform vulnerability analysis and automatically generate a report☆57Updated 3 years ago