Generate reverse shells in command line with Go !
☆21Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for goshell
Users that are interested in goshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Feb 22, 2021Updated 5 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆15Jun 15, 2021Updated 4 years ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Jan 15, 2019Updated 7 years ago
- An open-source .NET Ransomware☆23Aug 2, 2021Updated 4 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆15Sep 16, 2023Updated 2 years ago
- ☆47Aug 15, 2021Updated 4 years ago
- Sondera Harness SDK for Agent Scaffolds for Python☆30Apr 10, 2026Updated 3 weeks ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- A USB phishing evaluation platform☆46Oct 15, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- C# remote process injection utility for Cobalt Strike☆88Mar 9, 2020Updated 6 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Use these VDP in Bug Hunting, These VDP are checked and verified by Bug Hunters☆20Aug 9, 2022Updated 3 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- WASI libc implementation for WebAssembly☆15Jan 28, 2025Updated last year
- Script para la instalación automática de una capa de personalización en Kali Linux OS.☆17Updated this week
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- Webripper Pro is a comprehensive, professional-grade web vulnerability scanner that automates the detection of security flaws in websites…☆39Jul 4, 2025Updated 9 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- ☆13Dec 15, 2024Updated last year
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆15Jan 11, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 5 years ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Feb 14, 2026Updated 2 months ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago