A simple tool to interact with web shells and command injection vulnerabilities
☆36Nov 26, 2024Updated last year
Alternatives and similar repositories for wshlient
Users that are interested in wshlient are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated last week
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 3 months ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 2 months ago
- Descrição diário da toda minha trajetória de estudos☆15Jan 30, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆14Nov 8, 2024Updated last year
- Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite☆44Sep 12, 2024Updated last year
- A fast subdomain takeover tool☆86Nov 10, 2023Updated 2 years ago
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆18Nov 21, 2024Updated last year
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 3 months ago
- ☆11May 17, 2024Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- ☆42Sep 28, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Automation of some MAPT activities and interaction with the mobile Android device.☆27Sep 28, 2025Updated 5 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated last year
- ☆20Jun 26, 2024Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆39Sep 12, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Lightweight CLI note tracker in Golang with SQLite. A changelog for your mind all within the terminal!☆11Jan 16, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An implementation of the multi-paradigm declarative language Curry which compiles Curry programs into Haskell programs☆20Feb 22, 2026Updated last month
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Jan 29, 2024Updated 2 years ago
- 👶🏻😿 A zero-dependency network sniffer, written from scratch, that supports emulated and native cBPF. Runs on Linux, BSD, macOS and Win…☆13Nov 8, 2025Updated 4 months ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)☆19Apr 30, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- Webripper Pro is a comprehensive, professional-grade web vulnerability scanner that automates the detection of security flaws in websites…☆38Jul 4, 2025Updated 8 months ago
- nilnesserr = nilness + nilerr☆10Apr 4, 2025Updated 11 months ago
- Made VRChat Avatar creation and testing easier☆10Dec 28, 2022Updated 3 years ago
- Android VPN app based on v2ray, v2rayNG, leaf and noisy-shuttle☆11Apr 1, 2025Updated 11 months ago
- ☆14Sep 28, 2023Updated 2 years ago