lnxg33k / webhandlerLinks
Bash simulator to control a server using PHP system functions.
☆100Updated 5 years ago
Alternatives and similar repositories for webhandler
Users that are interested in webhandler are comparing it to the libraries listed below
Sorting:
- Burp Suite Extensions☆129Updated 12 years ago
- ☆83Updated 8 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 7 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆124Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 8 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Updated 6 years ago
- A small python script to check for Cross-Site Tracing (XST)☆132Updated 9 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- A JBoss script for obtaining remote shell access☆177Updated 5 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- ☆35Updated 9 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147Updated 9 years ago
- CVE-2018-6389 Exploit In WordPress DoS☆81Updated 7 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- Some scripts and exploits☆147Updated 7 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Updated 11 years ago
- CookieCatcher☆145Updated 12 years ago
- unix wildcard attacks☆136Updated 7 years ago
- scripts for pentesting☆87Updated 7 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Some works on Nmap Scripts (NSE)☆88Updated last year
- ☆231Updated 10 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Updated 4 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 7 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago