DragonForceWebshell
☆42Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for DFS
Users that are interested in DFS are comparing it to the libraries listed below
Sorting:
- Perform With Massive Wordpress Enumeration☆12Aug 18, 2023Updated 2 years ago
- Perform With Massive RTSP Scanner & Brute Force☆18Jan 8, 2026Updated last month
- ☆23Jun 22, 2021Updated 4 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Jul 24, 2023Updated 2 years ago
- Crack password ZIP, RAR and PDF with dictionary.☆26Oct 4, 2023Updated 2 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- A 3D Slicer app for Android, for you to print on-the-go.☆11Feb 25, 2023Updated 3 years ago
- Run checkra1n on Android to Jailbreak iOS device☆33Sep 10, 2020Updated 5 years ago
- FOFA-X是一款方便处理FOFA URL的工具☆12Nov 11, 2024Updated last year
- Java代 码审计学习笔记☆13Dec 20, 2024Updated last year
- Chrome extension which sets cookies in bulk from raw header text☆13Mar 2, 2023Updated 3 years ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Aug 4, 2022Updated 3 years ago
- AI-driven CVE search - deepest analysis of Common Vulnerabilities and Exposures (CVE)☆13Feb 22, 2024Updated 2 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- This is for kex repair and solve VNC server error in kali linux android in Termux .☆17Sep 25, 2023Updated 2 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- A simple web application for browsing rule34☆14Sep 8, 2018Updated 7 years ago
- 递归寻找JS泄露的路径。Recursively search for the paths of JS Files.For pentest☆11Sep 30, 2024Updated last year
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- 蚁剑反制马☆13Aug 16, 2023Updated 2 years ago
- Multi-themes for refined☆14May 18, 2020Updated 5 years ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Hook for the PoC for exploiting CVE-2024-32002☆16May 19, 2024Updated last year
- ☆14Mar 5, 2023Updated 2 years ago
- Midbar is more than just a password vault! Midbar is designed to significantly increase the cost of unauthorized access to its user's per…☆13May 19, 2024Updated last year
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10Jan 5, 2022Updated 4 years ago
- ☆12Nov 25, 2024Updated last year
- 自研的linux_c2☆13Jun 28, 2023Updated 2 years ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- Make level up and forgot about termux☆12Jan 29, 2021Updated 5 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- 一款用Go实现的批量加载漏洞检测插件进行多线程扫描的框架。☆11Jan 20, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Anti-Rootkit Tool for Windows☆12Mar 24, 2025Updated 11 months ago
- BeamStalker is open-source firmware for esp based board designed for RF experimentation, encouraging collaboration and ethical exploratio…☆13May 11, 2025Updated 9 months ago
- ☆11Nov 12, 2025Updated 3 months ago