Den1al / JSShellLinks
An interactive multi-user web JS shell
☆366Updated 3 years ago
Alternatives and similar repositories for JSShell
Users that are interested in JSShell are comparing it to the libraries listed below
Sorting:
- Search Exploitable Software on Linux☆234Updated 2 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 8 months ago
- An exploit for Apache Struts CVE-2018-11776☆303Updated 7 years ago
- Freedom Fighting Mode: open source hacking harness☆345Updated last year
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆279Updated 7 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆320Updated 7 months ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆297Updated 2 years ago
- ☆218Updated 3 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Updated 5 years ago
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- An XSS reverse shell framework☆310Updated 7 years ago
- Exploits for various CVEs☆212Updated 5 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Updated 8 years ago
- an asynchronous target enumeration tool☆245Updated 3 years ago
- Pentest/BugBounty progress control with scanning modules☆282Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Updated 2 years ago
- ☆208Updated 4 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Updated 4 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Updated 4 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆264Updated 2 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆276Updated last year
- Sample vulnerable code and its exploit code☆190Updated 4 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆198Updated 5 years ago
- Pip install exploit package☆157Updated 7 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Updated 4 years ago
- Burp Suite Extensions☆129Updated 12 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆224Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago