Look for a backdoor shell on the website
☆14Jul 17, 2018Updated 7 years ago
Alternatives and similar repositories for shell-scan
Users that are interested in shell-scan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SHELL SCANNER☆21Apr 11, 2019Updated 7 years ago
- Github information gathering☆25Jul 19, 2021Updated 4 years ago
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Jan 31, 2025Updated last year
- A collection of Windows, Website and Wifi pentesting scripts and exploits.☆16Nov 9, 2021Updated 4 years ago
- Spam Chat Facebook☆23Aug 9, 2018Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Jan 26, 2017Updated 9 years ago
- Encode / Decode☆16Dec 30, 2019Updated 6 years ago
- Short guide on how to connect to Termux SSH from anywhere while using TailScale as connection link.☆13Aug 30, 2021Updated 4 years ago
- Termux website scanner☆21Jun 21, 2021Updated 4 years ago
- Termux bomb for OS - Android and IOS☆10Jul 16, 2020Updated 5 years ago
- A Script For Termux That use ADB To Unlock Locked Android Phone Using | ⚠️ USB educational purposes only☆36Sep 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Th3_Monster Tool 2.5 ☣ Website Vulnerability Scanner & Auto Exploiter Bot ☣ .☆18Aug 11, 2018Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- android设备通过OTG线连接外接设备,并进行指令通讯☆11Jul 14, 2017Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- H5调用摄像头扫描条形码、二维码☆19Oct 19, 2020Updated 5 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- WhatsApp hacker pro☆18Jun 21, 2019Updated 6 years ago
- Learn python3 in one picture.☆21Sep 15, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Kumpulan script nuyul cryptocurency termux dari berbagai sumber channel youtube dan sudah ada sumber dan link websitenya☆13Aug 14, 2022Updated 3 years ago
- ☆18Sep 8, 2025Updated 7 months ago
- Natāksara. Tata letak papan tombol (keyboard layout) aksara jawa, berdasar tata letak baku yang ditetapkan oleh Kongres Aksara Jawa 1☆18Mar 30, 2021Updated 5 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Oct 7, 2019Updated 6 years ago
- termux api usage☆14Apr 24, 2019Updated 6 years ago
- private online storage for hackers☆16Sep 1, 2013Updated 12 years ago
- Python Security/Hacking Kit☆47Nov 10, 2019Updated 6 years ago
- Docker image to build personal website with resume☆11Aug 16, 2022Updated 3 years ago
- rang3r | Multi Thread IP + Port Scanner☆128Oct 28, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Dec 11, 2017Updated 8 years ago
- php-cli vulnerability scanner☆79Jun 29, 2015Updated 10 years ago
- Recursively calculates the hash of all files in a given path and checks them against the Virustotal threat database☆14Jun 30, 2023Updated 2 years ago
- This tool named "LockIt" is mainly use to prank friends with this , All working apis are present in the script , If you do any illegal ac…☆11Oct 7, 2024Updated last year
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 3 months ago
- NCAR - Android Automotive Project☆12Nov 11, 2024Updated last year
- ☆33Oct 5, 2016Updated 9 years ago