gildasio / wshlientLinks
A simple tool to interact with web shells and command injection vulnerabilities
☆36Updated 11 months ago
Alternatives and similar repositories for wshlient
Users that are interested in wshlient are comparing it to the libraries listed below
Sorting:
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 6 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆52Updated 5 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Colored Cat is a syntax highlighter file reader.☆15Updated last year
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆14Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆34Updated 3 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆24Updated 4 years ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated last year
- ☆55Updated 9 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- This is an AD pentest tools collection☆59Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Zero effort, zero error network enumera…☆52Updated 3 weeks ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆109Updated last month
- ☆35Updated 7 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 7 months ago
- ☆24Updated 8 months ago
- ☆128Updated 4 months ago
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- A fast and comprehensive tool for organizational network scanning☆135Updated last year
- Manage attack surface data on Elasticsearch☆23Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Epyon is a swiss army knife tool for pentesting DevOps ecosystems.☆82Updated last month
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year