urchinsec / param-ninjaLinks
An automated penetration testing tool , that automates web vulnerabilities testing upon a given URL with an endpoint parameter
☆24Updated last year
Alternatives and similar repositories for param-ninja
Users that are interested in param-ninja are comparing it to the libraries listed below
Sorting:
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆41Updated 9 months ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆13Updated 5 years ago
- Cracking protocols FTP and SSH.☆10Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆24Updated 2 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆97Updated 2 years ago
- Generate Malicious QR or similar☆16Updated 2 years ago
- Information Gathering Simplified.☆71Updated 2 years ago
- A web scraper to scrape email's and phone numbers from Websites.☆102Updated 3 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 10 months ago
- An OSINT focused tool made with Nodejs!☆99Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆201Updated 5 months ago
- Websites Vulnerability Scanner☆72Updated 3 months ago
- Beelzebub all in one Hacking Tools, Shell finder, Zone-H Grabber, ReverseIP, SMTP Finder, XMLRPC BF and more☆26Updated 3 months ago
- Nice list of google dorks for SQL injection☆133Updated 7 years ago
- ☆30Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆147Updated 11 months ago
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆57Updated last year
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆76Updated 2 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆45Updated last year
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆93Updated 2 years ago
- ☆67Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- Hacking every email by use script Mr.Robot☆54Updated 7 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆50Updated last year
- ReconHound is Best OSINT Tool For Enumeration We've Given 10 Different Type Of Enumeration Sub Tools Its Recon Framework Based On Api☆19Updated last year
- Information Gathering tool for a Website or IP address☆55Updated last year
- Hackerinfo infromations Web Application Security☆74Updated 2 years ago
- Osint tool to scraper websites☆65Updated 2 years ago