hosh-shell / hosh
Human Oriented SHell
☆26Updated 11 months ago
Alternatives and similar repositories for hosh:
Users that are interested in hosh are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Updated last year
- Smart Content Management System using Spring Boot☆17Updated last week
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆15Updated 5 months ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Updated 3 months ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- A tool to check for response status codes with ease☆14Updated last year
- Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in…☆28Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆16Updated last year
- A python script to IDOR exploration☆41Updated 4 years ago
- The ultimate Java library for Troy Hunt's ';-- Have I Been Pwned (v3).☆14Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆15Updated last month
- Yet another OSINT automator.☆19Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆40Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆12Updated 3 years ago
- Open Redirect Vulnerability scanner (Pwn0sec-Project)☆16Updated 4 years ago
- 📝 A repository containing different java tutorials☆37Updated last month
- Looto - muilti-thread port scanner with powerful user-friendly GUI. Scan your network to be sure you are safe. This software can use ONLY…☆11Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Updated 3 years ago