Shell Please 1.0 : Reverse shell code generator.
☆36Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for shp
Users that are interested in shp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- ☆354Apr 27, 2021Updated 5 years ago
- Useful scripts for autokey☆29Oct 28, 2020Updated 5 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- ☆19Jul 23, 2021Updated 4 years ago
- ☆75Mar 24, 2021Updated 5 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- wew oscp☆284Jun 28, 2022Updated 3 years ago
- ☆18Dec 8, 2022Updated 3 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated last year
- ☆32Oct 21, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- Automatically load stolen cookies from ChromePass☆27Mar 19, 2021Updated 5 years ago
- eJPT CheatSheet☆28Feb 4, 2021Updated 5 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 9 months ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- bug bounty automation☆14Jul 2, 2021Updated 4 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Some Cheat Sheet for Red Team☆17Dec 30, 2022Updated 3 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆12Jun 22, 2022Updated 3 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Feb 27, 2014Updated 12 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- ☆18Jun 18, 2021Updated 4 years ago
- Write-Ups for TryHackMe☆24May 15, 2021Updated 4 years ago
- JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.☆66Feb 27, 2026Updated 2 months ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆53Mar 14, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of notes for talks☆13Jan 6, 2024Updated 2 years ago
- A curated list of different pentesting resources☆30Feb 26, 2022Updated 4 years ago
- ☆16Apr 6, 2021Updated 5 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- a patched sshd for red team activities☆85Aug 8, 2021Updated 4 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- Latex template based on the typographic memoir class for formatting PhD dissertations. Suitable for any areas but devised for computer sc…☆18May 14, 2012Updated 13 years ago