Den1al / JSShellLinks
An interactive multi-user web JS shell
☆364Updated 3 years ago
Alternatives and similar repositories for JSShell
Users that are interested in JSShell are comparing it to the libraries listed below
Sorting:
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆424Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 4 months ago
- Search Exploitable Software on Linux☆231Updated 2 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆434Updated last year
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆276Updated 6 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆296Updated 2 years ago
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- ☆217Updated 3 years ago
- Freedom Fighting Mode: open source hacking harness☆340Updated last year
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆392Updated 7 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆196Updated 5 years ago
- ☆208Updated 4 years ago
- An extremely fast and flexible web fuzzer☆220Updated 2 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆316Updated 3 months ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 7 years ago
- Exploits for various CVEs☆210Updated 5 years ago
- Pip install exploit package☆156Updated 6 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆330Updated 2 years ago
- An XSS reverse shell framework☆309Updated 6 years ago
- An exploit for Apache Struts CVE-2017-9805☆250Updated 7 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆219Updated last year
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆259Updated 2 years ago
- Linux post exploitation enumeration and exploit checking tools☆181Updated 5 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- Sample vulnerable code and its exploit code☆189Updated 4 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Burp Suite Extensions☆129Updated 12 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆275Updated last year
- ☆232Updated 9 years ago
- Burp extension to perform Java Deserialization Attacks☆214Updated last year