🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚
☆11Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for vShell
Users that are interested in vShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Un simple reverse shell indétectable (1/65 sur virustotal au 12/02/2022) écrit en C# qui utilise un client socket UDP sur le port 53 (por…☆12Feb 12, 2022Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Various coding challenges from implemented in V.☆15May 31, 2023Updated 2 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- A reverse TCP payload and listener both written in python3.☆30Jun 4, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated last year
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆28Nov 14, 2022Updated 3 years ago
- Application Hijack Scanner for macOS☆71Sep 28, 2021Updated 4 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 26, 2026Updated 2 weeks ago
- Alien Logger is a MaaS (Malware as a Service) website offering an easier to use alternative from the traditional keylogger.☆29Oct 31, 2021Updated 4 years ago
- A wacky exploitation framework written in pure python3.☆22Mar 24, 2024Updated 2 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆39Aug 9, 2023Updated 2 years ago
- A minimalistic logger for Windows Kernel Drivers.☆25Mar 8, 2024Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated 3 months ago
- ☆10Feb 25, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- A powerful reverse shell generator☆46Mar 18, 2026Updated 3 weeks ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 3 years ago