A web application for running shell commands interactively on your server
☆21Dec 22, 2016Updated 9 years ago
Alternatives and similar repositories for TermGate
Users that are interested in TermGate are comparing it to the libraries listed below
Sorting:
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Chef cookbook to install Google Chrome browser☆16Oct 20, 2018Updated 7 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- A simple Chat system based on the RabbitMQ + Tornado + Websocket + Pika☆56Jun 9, 2015Updated 10 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆65Nov 5, 2015Updated 10 years ago
- ☆68Aug 16, 2021Updated 4 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Утилита от R-Vision для нахождения систем, уязвимых для шифровальщика WannaCry☆29May 15, 2017Updated 8 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated last week
- ☆121Oct 6, 2015Updated 10 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- GUI for monitoring cast-xmr☆10Apr 13, 2018Updated 7 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago