A Bash script to test a list of URLs for the shellshock vulnerability.
☆26Nov 15, 2019Updated 6 years ago
Alternatives and similar repositories for Shellshocker
Users that are interested in Shellshocker are comparing it to the libraries listed below
Sorting:
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- A ctypes powered python keylogger.☆107Nov 12, 2019Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- A simple tool to convert the IP to a DWORD IP☆144Jul 29, 2022Updated 3 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆23Jan 20, 2018Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Template for OTC Infrastructure Charts☆12Oct 16, 2025Updated 4 months ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Python network tool, similar to Netcat with custom features.☆197May 31, 2017Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Multi-threaded web application directory bruteforcer☆28Feb 4, 2019Updated 7 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Small, one-off scripts for security related stuff I've written over time☆37Mar 2, 2025Updated 11 months ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- A simple Burp extension for scanning stuffs in CTF☆30Jan 22, 2018Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago