A fast way to scan your server for outdated software and potential exploits.
☆380May 20, 2024Updated last year
Alternatives and similar repositories for bashscanner
Users that are interested in bashscanner are comparing it to the libraries listed below
Sorting:
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- ☆614Oct 4, 2024Updated last year
- ☆49Mar 31, 2016Updated 9 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- A list of published research documents☆248Jul 10, 2024Updated last year
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325May 9, 2016Updated 9 years ago
- Local Privilege Escalation☆210Feb 28, 2017Updated 9 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆320Updated this week
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Feb 3, 2022Updated 4 years ago
- ☆71Oct 19, 2015Updated 10 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 8 months ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago