gildasio / wshlientLinks
A simple tool to interact with web shells and command injection vulnerabilities
☆35Updated 8 months ago
Alternatives and similar repositories for wshlient
Users that are interested in wshlient are comparing it to the libraries listed below
Sorting:
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆24Updated 4 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆50Updated 2 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 4 months ago
- ☆54Updated 6 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆30Updated last month
- A modular exploitation framework extensible with Lua☆65Updated 5 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆66Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆41Updated 4 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 5 months ago
- ☆42Updated last month
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆45Updated 6 months ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆35Updated last week
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆80Updated last month
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆84Updated 5 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 11 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆46Updated 4 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year