Generate reverse shells in command line with Go !
☆20Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for goshell
Users that are interested in goshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Feb 22, 2021Updated 5 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Jan 15, 2019Updated 7 years ago
- Git-Finder is a tool that searches through public repositories to find sensitive information like password,auth_token, etc uploaded to t…☆12Mar 15, 2020Updated 6 years ago
- ☆15Jun 15, 2021Updated 4 years ago
- An open-source .NET Ransomware☆22Aug 2, 2021Updated 4 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆31Feb 10, 2025Updated last year
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆11Sep 16, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- ☆46Aug 15, 2021Updated 4 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- A USB phishing evaluation platform☆46Oct 15, 2015Updated 10 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Use these VDP in Bug Hunting, These VDP are checked and verified by Bug Hunters☆20Aug 9, 2022Updated 3 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- WASI libc implementation for WebAssembly☆15Jan 28, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Search library for yandex.ru search engine.☆16Jun 13, 2017Updated 8 years ago
- A Chrome cookie dumping utility☆46Feb 21, 2020Updated 6 years ago
- ☆13Dec 15, 2024Updated last year
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆15Jan 11, 2023Updated 3 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 5 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- gui tool to create normal payload by msfvenom☆34Dec 26, 2018Updated 7 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- ☆41Oct 8, 2024Updated last year
- ☆74Apr 8, 2024Updated last year