Differents WebShell usefull for CTF
☆12Jul 21, 2017Updated 8 years ago
Alternatives and similar repositories for webshell
Users that are interested in webshell are comparing it to the libraries listed below
Sorting:
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 5 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Vuln Liferay scanner & Exploit☆21Mar 30, 2020Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆27Nov 13, 2017Updated 8 years ago
- A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap …☆27Feb 12, 2020Updated 6 years ago
- OmTraffic is a fast and efficient Python Omegle traffic bot that enables you to send a large number of messages to random strangers on Om…☆10May 21, 2023Updated 2 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Apr 1, 2022Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated last month
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- DeepAlign: Alignment-based Process Anomaly Correction Using Recurrent Neural Networks☆10Mar 25, 2023Updated 2 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Digital Identity and Blockchain☆10May 19, 2018Updated 7 years ago
- Next-Gen Data Classification and Encryption☆15Jan 29, 2025Updated last year
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- Azure APIs enumeration and abuse☆13Feb 26, 2026Updated last week
- WireGuard client for PacketFence ZTNA☆11Apr 26, 2021Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆13Jan 6, 2022Updated 4 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- A collection of examples, tests and documentation for building a real-time web app with python tornado.☆18Feb 26, 2014Updated 12 years ago
- Burp suite extension which help you to find inconsistency between content-type header and body parsers☆11Sep 14, 2025Updated 5 months ago
- Linux /proc data in a consistent, parsed format.☆10Mar 28, 2016Updated 9 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- ☆11Dec 13, 2021Updated 4 years ago
- Deception implementation through analysis of BloodHound data☆53Oct 9, 2025Updated 4 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- CLI script/web API to show lunar phase information☆11May 8, 2023Updated 2 years ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago