Web shell generator and command line interface.
☆85Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for wsh
Users that are interested in wsh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Oct 6, 2020Updated 5 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Sep 15, 2022Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- ☆199Aug 28, 2025Updated 7 months ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM syste…☆282Sep 14, 2022Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- Password Spraying Framework☆64Jun 9, 2022Updated 3 years ago
- Yet Another LinkedIn Scraper☆32Mar 9, 2023Updated 3 years ago
- ☆20Nov 5, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Oct 31, 2021Updated 4 years ago
- the only php webshell you need.☆230Mar 18, 2025Updated last year
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- SpringbootGuiExploit漏洞利用工具测试版☆20Jun 7, 2024Updated last year
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆15Dec 16, 2020Updated 5 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Aug 18, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- A simple HTTP server for delivering and exfiltrating files/data during, for example, CTFs.☆80Jul 27, 2025Updated 8 months ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- A powerful and delightful PHP WebShell☆68Feb 16, 2025Updated last year
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- find where an image is taken☆18Jul 14, 2022Updated 3 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- This script allow to scrape shodan.io IoT search engine and get devices IP without using your search or download credit!☆12May 26, 2021Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago