brosck / Farllen
「🚪」Port forwarding tool to gain access to internal devices
☆12Updated 5 months ago
Alternatives and similar repositories for Farllen
Users that are interested in Farllen are comparing it to the libraries listed below
Sorting:
- 「📖」Tool created to extract metadata from a domain☆14Updated 5 months ago
- 「🚪」The hidden hookless backdoor☆12Updated 5 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- ☆14Updated last month
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- Malware Libraries focused in help Malware Development☆18Updated 2 years ago
- Subdomain Recon Tool☆13Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Automate Blind SQL Injection with Python.☆21Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 3 months ago
- xdebug 2.5.5 RCE exploit☆30Updated 4 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 3 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆9Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆17Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated last year
- Laravel Dork And Laravel Path☆10Updated 4 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆15Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆17Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- ☆12Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 4 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- 「🐞」Bug Bounty Tricks☆38Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆10Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 5 months ago