gildasio / wshlientLinks
A simple tool to interact with web shells and command injection vulnerabilities
β36Updated 10 months ago
Alternatives and similar repositories for wshlient
Users that are interested in wshlient are comparing it to the libraries listed below
Sorting:
- γπ§±γTest a list of payloads and see if you can bypass itβ61Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting commaβ¦β34Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environmentsβ12Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!β52Updated 4 months ago
- A fast Go-based tool to uncover sensitive information in JavaScriptβ34Updated 3 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services β¦β101Updated 6 months ago
- A network logging tool that logs per process activitiesβ32Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is makingβ101Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated last year
- API fuzzer that exposes security flaws by sending malformed inputsβ16Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β39Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), aβ¦β52Updated 7 months ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.β24Updated 4 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! π΄ββ οΈβ44Updated 6 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.β46Updated 8 months ago
- A collection of tools that I use in CTF's or for assessmentsβ102Updated 8 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchersβ92Updated last year
- Repo for all my exploits/PoCsβ53Updated 5 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secureβ30Updated last year
- This is an AD pentest tools collectionβ59Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.β59Updated 6 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systβ¦β49Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.β67Updated last year
- masscan with exclusive excludesβ57Updated last year
- β35Updated 6 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ34Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.β19Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ51Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).β52Updated last year