Shock the shell! Exploit many injection method for shellshock
☆18Sep 3, 2018Updated 7 years ago
Alternatives and similar repositories for Evil-Shock
Users that are interested in Evil-Shock are comparing it to the libraries listed below
Sorting:
- Web Application Vulnerability Scanner☆19Oct 18, 2018Updated 7 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆12Nov 23, 2025Updated 3 months ago
- Python program for installing many tools automatically☆15Dec 31, 2021Updated 4 years ago
- Automated enumeration for red teamers☆10Nov 22, 2022Updated 3 years ago
- WhatsApp Bot with rich features☆13Aug 6, 2022Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.☆17Mar 3, 2023Updated 3 years ago
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- ☆26Mar 6, 2025Updated 11 months ago
- Informatrion Gathering Framework☆22Aug 28, 2022Updated 3 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A .net Crackme Challenge made for the SecTalks Brisbane 2017 Capture the Flag Event. Writeup/solution included.☆22Oct 2, 2017Updated 8 years ago
- ☆48Nov 26, 2025Updated 3 months ago
- Instagram Brute Force Attack !☆23Oct 8, 2023Updated 2 years ago
- Random source codes☆26Dec 22, 2025Updated 2 months ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 8 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- ☆20Aug 6, 2025Updated 6 months ago
- ☆10Aug 4, 2020Updated 5 years ago
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- ☆10Jul 16, 2024Updated last year
- ☆18May 11, 2021Updated 4 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- ☆11Oct 14, 2020Updated 5 years ago
- ☆29May 29, 2025Updated 9 months ago