Collection of useful scripts.
☆78Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆135Dec 10, 2021Updated 4 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43May 27, 2015Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- a collection of payloads for common webapps☆72Apr 24, 2013Updated 12 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Use burp's JS static code analysis on code from your local system.☆43Dec 22, 2016Updated 9 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago