evilpacket / node-shells
☆61Updated 7 years ago
Alternatives and similar repositories for node-shells:
Users that are interested in node-shells are comparing it to the libraries listed below
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 7 years ago
- try privilege escalation changing sudo command☆119Updated 7 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 6 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- Scripts for Deploying new server☆48Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- ☆122Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Extreme Vulnerable Node Application☆94Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- XXE vulnerability demo☆22Updated 10 years ago
- ProFTPD IAC Remote Root Exploit☆37Updated 7 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago