A simple tool to interact with web shells and command injection vulnerabilities
☆36Nov 26, 2024Updated last year
Alternatives and similar repositories for wshlient
Users that are interested in wshlient are comparing it to the libraries listed below
Sorting:
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- ☆14Nov 8, 2024Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 7 months ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- Descrição diário da toda minha trajetória de estudos☆15Jan 30, 2025Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆39Sep 12, 2024Updated last year
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 2 months ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- ☆20Jun 26, 2024Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Apr 30, 2024Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- Trojan feito em python☆25Feb 21, 2025Updated last year
- ☆47May 31, 2024Updated last year
- Webripper Pro is a comprehensive, professional-grade web vulnerability scanner that automates the detection of security flaws in websites…☆37Jul 4, 2025Updated 8 months ago
- Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite☆44Sep 12, 2024Updated last year
- ☆21Jan 3, 2025Updated last year
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆245Mar 28, 2024Updated last year
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Feb 11, 2026Updated 3 weeks ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- ☆33Apr 22, 2025Updated 10 months ago
- ☆27Oct 27, 2025Updated 4 months ago
- ☆11May 17, 2024Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆64Oct 17, 2025Updated 4 months ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year