BlackSubnet / bs-wgLinks
π Modern, lightweight WireGuard VPN web ui panel with a beautiful UI.
β23Updated 10 months ago
Alternatives and similar repositories for bs-wg
Users that are interested in bs-wg are comparing it to the libraries listed below
Sorting:
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)β42Updated 11 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.β148Updated 2 weeks ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using theβ41Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.β48Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.β40Updated 2 years ago
- Repo for all my exploits/PoCsβ51Updated 8 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and selfβdeletion.β65Updated 5 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β85Updated 11 months ago
- RCE PoC for Empire C2 framework <5.9.3β28Updated last year
- Fortinet FortiClient EMS SQL Injectionβ52Updated last year
- π€ The Modern, Blazing Fast Port Scanner π€β28Updated last year
- Adversary Simulation Frameworkβ38Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β86Updated 10 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ75Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ43Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago
- External recon toolkitβ54Updated last year
- β109Updated last year
- Auto exploitation tool for CVE-2024-24401.β36Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.β52Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logsβ68Updated 2 years ago
- Bruteforces Fortinet SSL VPNsβ57Updated 2 years ago
- β60Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β82Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β126Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in tβ¦β133Updated last year
- Quicky serve files over http or https using flask.β35Updated last year
- Malware traffic obfuscation libraryβ38Updated 6 months ago
- Abusing SSRF to deliver an authenticated command injection payloadβ30Updated 5 months ago