hosh-shell / hoshLinks
Human Oriented SHell
☆27Updated last year
Alternatives and similar repositories for hosh
Users that are interested in hosh are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Smart Content Management System using Spring Boot☆17Updated last week
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- ☆17Updated 5 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 6 years ago
- BAT is a tool to help everyone to securing their web-servers.☆12Updated 4 years ago
- Information Gathering and OSINT Tool☆12Updated last year
- Passive subdomain enumeration tool with http-probe.☆33Updated 4 years ago
- Development☆11Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- ☆15Updated 3 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆19Updated this week
- ☆13Updated 7 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆63Updated 5 years ago
- A tool to check for response status codes with ease☆14Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- Yet another powerful payload encoder/decoder☆13Updated 3 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆16Updated 2 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Intercept requests passively of DHCP from own network!☆13Updated 4 years ago
- Write-Ups for TryHackMe☆21Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 4 years ago
- AliGuard PHP WAF☆12Updated last year