jofpin / fuckshell
Simple Webshell Scanner
☆49Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for fuckshell
- Small backdoor using cookie.☆59Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- ☆19Updated 7 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 2 years ago
- web information gathering / Grab links☆41Updated 5 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Web application backdoor builder☆73Updated 3 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Massive arsenal of hacker tools...☆76Updated 7 years ago
- A tool that help you to guess how your shell was renamed after the server-side script of the file uploader saved it☆64Updated 3 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- A simple python reverse shell written just for fun.☆65Updated last year
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆34Updated 9 years ago
- Some wordpress user enumeration scripts.☆38Updated 7 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Simple security surveillance script for linux distributions.☆57Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago