pentestfunctions / WSL-SeamlessLinks
Seamless mode integration for WSL
☆11Updated 2 years ago
Alternatives and similar repositories for WSL-Seamless
Users that are interested in WSL-Seamless are comparing it to the libraries listed below
Sorting:
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆161Updated 2 months ago
- Quick scripts I developed to streamline OSCP tasks☆201Updated 7 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆432Updated last year
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆302Updated 2 months ago
- CVE-2025-68613: n8n RCE vulnerability exploit and documentation☆90Updated last month
- What the name says....☆104Updated last year
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆47Updated 3 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆122Updated 5 months ago
- NetProbe: Network Probe☆173Updated last year
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆333Updated 5 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆239Updated 4 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Updated 5 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 4 months ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆337Updated 3 years ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆385Updated last week
- Bookmarklet to find endpoints easily with one click☆75Updated last year
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆551Updated 5 months ago
- Security reconnaissance and assessment tool for identifying potentially exposed IP cameras by analyzing open ports, service configuration…☆773Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆590Updated last week
- ☆306Updated last year
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆296Updated last month
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆393Updated 2 months ago
- A WordPress plugin that provides reverse shell functionality with a graphical user interface (GUI) for configuration. This plugin allows …☆52Updated 2 months ago
- Nessus Professional Latest☆45Updated last year
- ☆46Updated 2 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆279Updated 2 years ago
- A fast WordPress plugin enumeration tool☆760Updated 2 weeks ago
- A RedTeam Toolkit☆409Updated 5 months ago
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆326Updated last month
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆172Updated 2 years ago