Human Oriented SHell
☆27Apr 1, 2024Updated last year
Alternatives and similar repositories for hosh
Users that are interested in hosh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Botnet targeting Windows machines 🐍☆46Feb 25, 2026Updated 3 weeks ago
- PEDA - Python Exploit Development Assistance for GDB☆23Aug 6, 2025Updated 7 months ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last week
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- JSONPath extension for BurpSuite☆30Nov 2, 2025Updated 4 months ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.☆14Nov 25, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- WRecon is an open source no intussive web scanner. It is designed to discover all URL in a website recursively, without using bruteforce …☆19Oct 23, 2020Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- ☆25Mar 21, 2020Updated 6 years ago
- An advanced reverse shell written in Python3.☆21Oct 30, 2020Updated 5 years ago
- A simple Bash Script to Bypass Spotify Ads.☆10Jul 7, 2021Updated 4 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 6 years ago