Search the Community
Showing results for tags 'mass'.
Found 13 results
-
Spotify-Checker is a tools helps to Mass Spotify Accounts Checker .Spotify-Checker is Developed by @Xpykerz. The script is writen is python. This tool will works on both Linux,Windows and Android by using python. You can able to check Spotify Account Combo list using this tool . note : combo in the format Email:Password [hide][Hidden Content]]
-
ATSCAN SCANNER v17.0.1 - Advanced dork Search & Mass Exploit Scanner
a topic posted itsMe in Hacking Tools
★ Description: ● Engines: [Google apis cache] Bing Ask Yandex Sogou Exalead Shodan ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Mass Extern commands execution. ● Exploits and issues search. ● XSS / SQLI / LFI / AFD scanner. ● Filter wordpress & Joomla sites. ● Wordpress theme and plugin detection. ● Find Admin page. ● Decode / Encode Base64 / MD5 ● Ports scan. ● Collect IPs ● Collect E-mails. ● Auto detect errors. ● Auto detect forms. ● Auto detect Cms. ● Post data. ● Auto sequence repeater. ● Validation. ● Post and Get method ● IP Localisation ● Issues and Exploit search ● Interactive and Normal interface. ● And more... [hide][Hidden Content]] -
Advanced Search / Dork / Mass Exploitation Scanner Description Search engine Google / Bing / Ask / Yandex / Sogou ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Extern commands execution. ● XSS / SQLI / LFI / AFD scanner. ● Filter wordpress and Joomla sites on the server. ● Find Admin page. ● Decode / Encode Base64 / MD5 ● Ports scan. ● Extract IPs ● Extract E-mails. ● Auto-detect errors. ● Auto-detect Cms. ● Post data. ● Auto sequence repeater. ● Validation. ● Post and Get method ● And more… CHANGES: v17.0.1 – Fix bug extern process. [hide][Hidden Content]]
-
[Hidden Content]
-
AutoSploit As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the Shodan.io API. The program allows the user to enter their platform-specific search query such as; Apache, IIS, etc, upon which a list of candidates will be retrieved. After this operation has been completed the ‘Exploit’ component of the program will go about the business of attempting to exploit these targets by running a series of Metasploit modules against them. Which Metasploit modules will be employed in this manner is determined by programmatically comparing the name of the module to the initial search query. However, I have added functionality to run all available modules against the targets in a ‘Hail Mary’ type of attack as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, localhost and local port for MSF facilitated back connections are configured through the dialog that comes up before the ‘Exploit’ component is started. Operational Security Consideration Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available. Version 4.0 released Implements the ability to use nmap from within the terminal function as a "local" system. Meaning that instead of having multiple tabs open to nmap and attack you can now nmap from within the shell and make your choice on what to target [HIDE][Hidden Content]]
-
- 2
-
-
- autosploit
- v4.0
-
(and 3 more)
Tagged with:
-
This Too u can use it to auto upload mailer in shells & send with it [HIDE][Hidden Content]]
-
Advanced Search / Dork / Mass Exploitation Scanner Description Search engine Google / Bing / Ask / Yandex / Sogou ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Extern commands execution. ● XSS / SQLI / LFI / AFD scanner. ● Filter wordpress and Joomla sites on the server. ● Find Admin page. ● Decode / Encode Base64 / MD5 ● Ports scan. ● Extract IPs ● Extract E-mails. ● Auto-detect errors. ● Auto-detect Cms. ● Post data. ● Auto sequence repeater. ● Validation. ● Post and Get method ● And more… CHANGES: v17.0.0 – Engine fix. – Some scans fix. [HIDE][Hidden Content]]
-
[HIDE][Hidden Content]]
-
Where can i get good IP SMTP Senders for send out mass emails
a question posted markzuck101 in General doubts
Am in need of good IP SMTP senders please can anyone including the administrator help me out with where i can get good IP SMTP senders? Your help will be appreciated. Thanks! -
1- Provide a hosting / domain to store php files . 2- Provide an email list and the contents of the email that will be sent. 3- Run this email sender php. [Hidden Content]
-
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started Operational Security Consideration Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available. The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent. This release adds a number of features and bug fixes. Features New Terminal. Now also supports; Custom Commands Command History Native binary execution (/bin & /sbin) Host file backup support Options to renew or reset API tokens SRC [Hidden Content]
-
AutoSploit As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started Operational Security Consideration Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available. The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent. Changelog v3.0 Features New Terminal. Now also supports; Custom Commands Command Histor Native binary execution (/bin & /sbin) Host file backup support Options to renew or reset API tokens [HIDE][Hidden Content]]
-
- 6
-
-
- autosploit
- v3.0
- (and 4 more)