evilpacket / node-shells
☆61Updated 7 years ago
Alternatives and similar repositories for node-shells
Users that are interested in node-shells are comparing it to the libraries listed below
Sorting:
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Nodejs application intentionally vulnerable to SSRF☆41Updated 2 years ago
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- WhiteBox CMS analysis☆69Updated last year
- a collection of payloads for common webapps☆73Updated 12 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 8 months ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A websocket proxy☆54Updated 7 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 11 months ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Pillage a git repo found in an accessible web root☆61Updated 13 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- ☆57Updated 4 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- ☆63Updated 12 years ago