yak0d3 / dDumperLinks
dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.
☆20Updated last year
Alternatives and similar repositories for dDumper
Users that are interested in dDumper are comparing it to the libraries listed below
Sorting:
- web information gathering / Grab links☆43Updated 5 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- ☆19Updated 7 years ago
- ☆17Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 6 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Automated Tools Pentest☆7Updated 2 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Trying to be the best tool to search for exploits in the terminal.☆20Updated 2 years ago
- ☆13Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 10 years ago
- ☆9Updated 5 years ago
- Hash Generator & Cracker☆38Updated 5 years ago
- ☆15Updated 2 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆12Updated 11 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 7 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- this contain many web shells used to make a backdoor on a server☆10Updated 8 years ago
- Know the dangers of credential reuse attacks.☆7Updated 6 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago