hosh-shell / hosh
Human Oriented SHell
☆26Updated last year
Alternatives and similar repositories for hosh:
Users that are interested in hosh are comparing it to the libraries listed below
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Yet another powerful payload encoder/decoder☆14Updated 3 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- This Tool is for web penetration Testing.☆19Updated 4 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Updated 2 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Updated 5 months ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Script Recon Bug Bounty☆10Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆12Updated 4 years ago
- ☆17Updated 5 years ago
- Version 2.0 of the quick and simple algorithm to search in big files faster than other rivals (Grep-Egrep etc)☆11Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- ☆17Updated 7 months ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆18Updated 4 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 4 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated last month
- Python tool for vulnerability assessment and persistence.☆9Updated 4 years ago
- Extract parameters/paths from urls☆17Updated 4 years ago