evilpacket / node-shells
☆61Updated 7 years ago
Alternatives and similar repositories for node-shells:
Users that are interested in node-shells are comparing it to the libraries listed below
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Splunk Web Shell☆51Updated 10 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 7 months ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- WhiteBox CMS analysis☆69Updated last year
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆36Updated 5 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- A JavaScript clickjacking PoC generator☆23Updated 5 years ago
- unix wildcard attacks☆132Updated 6 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- A websocket proxy☆54Updated 7 years ago
- Upgrade your netcat shell today!☆60Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Web shells for use in penetration testing☆39Updated 10 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 2 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Damn Vulnerable Node Application☆19Updated 9 years ago
- Pillage a git repo found in an accessible web root☆61Updated 13 years ago