gildasio / wshlientLinks
A simple tool to interact with web shells and command injection vulnerabilities
☆36Updated last year
Alternatives and similar repositories for wshlient
Users that are interested in wshlient are comparing it to the libraries listed below
Sorting:
- SprayShark is a modular G-Suite password sprayer with threading!☆56Updated 8 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Updated 6 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆44Updated 6 months ago
- Discovering Typo Squatting on your domains!☆80Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Updated 10 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Updated 7 months ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Updated 4 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆29Updated last month
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- SOAPI - The OpenAPI Documentation Scanner☆39Updated 11 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- ☆56Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 10 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Updated 2 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆52Updated last month
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…