A defense tool - detect web shells in local directories via md5sum
☆32Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for shellsum
Users that are interested in shellsum are comparing it to the libraries listed below
Sorting:
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- ☆15May 17, 2018Updated 7 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Dec 8, 2022Updated 3 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- A couple of my Flipper Zero payloads and files☆16Feb 19, 2023Updated 3 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- vt-use-cases☆20Dec 1, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Oct 27, 2021Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆15Apr 1, 2015Updated 10 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Apr 23, 2019Updated 6 years ago
- Yara intergrated into BurpSuite☆48Jun 30, 2016Updated 9 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- ☆540Mar 14, 2026Updated last week
- ☆25May 9, 2021Updated 4 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆120Mar 18, 2019Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- ☆13Jul 22, 2017Updated 8 years ago
- ☆17Mar 21, 2019Updated 7 years ago