BlackSubnet / bs-wgLinks
π Modern, lightweight WireGuard VPN web ui panel with a beautiful UI.
β21Updated 8 months ago
Alternatives and similar repositories for bs-wg
Users that are interested in bs-wg are comparing it to the libraries listed below
Sorting:
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- Repo for all my exploits/PoCsβ53Updated 6 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)β41Updated 9 months ago
- RCE PoC for Empire C2 framework <5.9.3β29Updated last year
- Bruteforces Fortinet SSL VPNsβ57Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β84Updated 8 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and selfβdeletion.β66Updated 3 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.β39Updated 2 years ago
- Fortinet FortiClient EMS SQL Injectionβ51Updated last year
- Auto exploitation tool for CVE-2024-24401.β36Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ71Updated last year
- π€ The Modern, Blazing Fast Port Scanner π€β28Updated 10 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ101Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ44Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using theβ39Updated 7 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.β52Updated last year
- External recon toolkitβ53Updated 10 months ago
- Gmail/GSuite account enumeration toolβ53Updated last year
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)β27Updated 4 months ago
- β109Updated last year
- Quicky serve files over http or https using flask.β35Updated 9 months ago
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ89Updated last week
- RCE through a race condition in Apache Tomcatβ56Updated 11 months ago
- DLink DIR-846 Authenticated Remote Code Executionβ18Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β82Updated last year
- Exploits targeting vBulletin.β75Updated 2 years ago
- VMware Aria Operations for Logs CVE-2023-34051β62Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.β44Updated last year
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Serverβ38Updated last year
- β42Updated last year