ikotler / hackershLinks
A free and open source command-line shell and scripting language designed especially for security testing
☆127Updated 11 years ago
Alternatives and similar repositories for hackersh
Users that are interested in hackersh are comparing it to the libraries listed below
Sorting:
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 10 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- SSH Based Remote Administration Tool☆104Updated 10 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Detect sandbox by cursor movement speed☆52Updated 2 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Exploits and research stuffs☆55Updated last year
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago