JShell - Get a JavaScript shell with XSS.
☆534May 5, 2019Updated 6 years ago
Alternatives and similar repositories for JShell
Users that are interested in JShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python module for dumping usable proxies.☆165Nov 13, 2019Updated 6 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆452May 5, 2019Updated 6 years ago
- Awesome XSS stuff☆5,094Oct 30, 2024Updated last year
- Intelligent login bruteforcer.☆913Apr 27, 2023Updated 2 years ago
- Cloak can backdoor any python script with some tricks.☆504May 5, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Nano is a family of PHP web shells which are code golfed for stealth.☆448Feb 18, 2020Updated 6 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,923Apr 13, 2022Updated 3 years ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,325Jun 4, 2023Updated 2 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆128Oct 1, 2020Updated 5 years ago
- Most advanced XSS scanner.☆14,872Apr 26, 2025Updated 11 months ago
- ☆182Feb 21, 2022Updated 4 years ago
- Crack hashes in seconds.☆1,873Dec 10, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CSRF Scanner☆587Jun 28, 2024Updated last year
- An advanced multithreaded admin panel finder written in python.☆841May 17, 2024Updated last year
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆472Nov 14, 2019Updated 6 years ago
- Drupal enumeration & exploitation tool☆611Nov 4, 2020Updated 5 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,257Jan 8, 2026Updated 3 months ago
- Reconnaissance Swiss Army Knife☆2,027Jan 26, 2021Updated 5 years ago
- Detect and decode encoded strings, recursively.☆926Sep 16, 2025Updated 6 months ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,733Dec 1, 2024Updated last year
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,486Oct 12, 2024Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,792Apr 26, 2024Updated last year
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- This tool can be used to brute discover GET and POST parameters☆1,395Aug 24, 2019Updated 6 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,135Apr 21, 2024Updated last year
- ☆2,321Dec 8, 2023Updated 2 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Extract endpoints from apk files.☆876Jan 7, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆335Aug 23, 2019Updated 6 years ago
- HTTP parameter discovery suite.☆6,184Feb 20, 2025Updated last year
- ☆332Jan 8, 2018Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- File upload vulnerability scanner and exploitation tool.☆3,306May 8, 2025Updated 11 months ago