needle-wang / jweevelyView external linksLinks
a exec jsp shell, simply like weevely php C/S shell.
☆14Jun 21, 2022Updated 3 years ago
Alternatives and similar repositories for jweevely
Users that are interested in jweevely are comparing it to the libraries listed below
Sorting:
- ☆10Jul 21, 2022Updated 3 years ago
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for b…☆13Mar 6, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- 一些比较冷门或者特殊的webshell脚本、jar包、war包☆15Oct 14, 2016Updated 9 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- 7bits安全团队-《Java安全-记一次实战使用memoryshell》代码样例☆19Nov 13, 2022Updated 3 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 5 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago