0xAsuka / shu-shellLinks
Webshell Jumping Edition
☆29Updated 8 years ago
Alternatives and similar repositories for shu-shell
Users that are interested in shu-shell are comparing it to the libraries listed below
Sorting:
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 11 years ago
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Updated 6 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 6 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆26Updated 6 years ago
- WordPress auto exploit☆30Updated 7 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Updated 5 years ago
- gui tool to create normal payload by msfvenom☆34Updated 6 years ago
- RDP EXPLOİT☆12Updated 5 years ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)☆84Updated 2 years ago
- ☆9Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 3 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Exploits for some of the vulnerabilities I have discovered☆18Updated 4 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- ☆19Updated 8 years ago
- Automated Tools Pentest☆7Updated 2 years ago
- Automate Metasploit scanning and exploitation☆115Updated 9 months ago