Shell Please 1.0 : Reverse shell code generator.
☆36Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for shp
Users that are interested in shp are comparing it to the libraries listed below
Sorting:
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- ☆355Apr 27, 2021Updated 4 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 10 months ago
- ☆15Sep 11, 2020Updated 5 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- ☆18Dec 8, 2022Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- Useful scripts for autokey☆29Oct 28, 2020Updated 5 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- Write-Ups for TryHackMe☆23May 15, 2021Updated 4 years ago
- JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.☆65Feb 27, 2026Updated last week
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- A Complete SubDomain Enumeration Tool☆25Oct 23, 2022Updated 3 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- eJPT CheatSheet☆28Feb 4, 2021Updated 5 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- XSS reflector vulnerabilities exploitation extended.☆27Jul 25, 2021Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆33Jan 5, 2022Updated 4 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- wew oscp☆280Jun 28, 2022Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Aug 28, 2023Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- The ultimate phishing tool with 38 websites available!☆16Nov 7, 2024Updated last year