Ullaakut / GorsairLinks
Gorsair gives root access on remote docker containers that expose their APIs
☆851Updated last year
Alternatives and similar repositories for Gorsair
Users that are interested in Gorsair are comparing it to the libraries listed below
Sorting:
- Declarative penetration testing orchestration framework☆291Updated 5 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆608Updated last year
- ☆352Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆623Updated last month
- The terminal-first http client☆623Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- An XSS reverse shell framework☆309Updated 6 years ago
- Goca Scanner☆330Updated 2 years ago
- Interactive Network Scanner☆1,033Updated 5 years ago
- TotalRecon installs all the recon tools you need☆465Updated 5 years ago
- An HTTP/HTTPS intercept proxy written in Go.☆1,006Updated 3 years ago
- A subdomain enumeration tool.☆898Updated 4 years ago
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆541Updated 6 years ago
- Go Web Application Penetration Test☆348Updated last year
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆690Updated 5 years ago
- nextnet is a pivot point discovery tool written in Go.☆451Updated 3 months ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆496Updated last year
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,076Updated 3 years ago
- generate reverse shell from CLI for linux and Windows.☆248Updated 5 years ago
- The best way to scan for weak ssh passwords on your network☆617Updated last year
- Seamlessly spy on SSH session like it is your tty☆349Updated 8 years ago
- CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys☆1,158Updated 2 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆339Updated last year
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- Bash post exploitation toolkit☆743Updated 2 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆867Updated 6 years ago
- My personal hacklab, create your own.☆334Updated 3 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆1,772Updated last week
- 🔥 A powerful MongoDB auditing and pentesting tool 🔥☆1,329Updated 2 years ago
- A tiny web auditor with strong opinions.☆591Updated 9 months ago