TheRook / nsshell
A DNS connectback shell executed by strings in payloads.txt
☆103Updated last year
Alternatives and similar repositories for nsshell:
Users that are interested in nsshell are comparing it to the libraries listed below
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆191Updated 7 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆103Updated 6 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆165Updated last year
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- try privilege escalation changing sudo command☆119Updated 7 years ago
- Albatar is a SQLi exploitation framework in Python☆135Updated last month
- ☆122Updated 7 years ago
- TLS Redirection☆120Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆111Updated 5 years ago
- Internet data acquisition☆149Updated 4 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Discover target social media profiles☆81Updated 2 years ago
- unix wildcard attacks☆131Updated 6 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- ☆125Updated 5 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆220Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- ☆55Updated 4 years ago
- Improved decoder for Burp Suite☆137Updated 3 years ago
- ☆180Updated 11 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆131Updated 8 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago