PHP Web shell based off WSO
☆39Apr 4, 2014Updated 11 years ago
Alternatives and similar repositories for shell
Users that are interested in shell are comparing it to the libraries listed below
Sorting:
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Examples for using the Pipl SEARCH API☆11Dec 19, 2023Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A simple storage class inspired by the redis api on top of Sqlite.☆16Dec 8, 2015Updated 10 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- simple storage helper inspired by the redis api☆19Jun 30, 2016Updated 9 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Windows OpenStack Heat templates☆14Apr 15, 2014Updated 11 years ago
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- Solana Dex Info for arbitrage bot☆18Sep 6, 2025Updated 6 months ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- This program show you IMSI numbers of cellphones around you.☆13Dec 14, 2017Updated 8 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- Alerting engine (slack etc) for testssl.sh JSON result output files☆16Jul 10, 2019Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- CVE-2018-4407 IOS/macOS kernel crash☆13Feb 23, 2019Updated 7 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆89Nov 19, 2015Updated 10 years ago
- TomatoCart v1.x respository☆22Aug 13, 2016Updated 9 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 11 years ago