WebSocket shell
☆14Nov 29, 2020Updated 5 years ago
Alternatives and similar repositories for wsshell
Users that are interested in wsshell are comparing it to the libraries listed below
Sorting:
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- 有一些渗透太繁琐重复,把前面的一些通用处理用脚本统一解决;如:子域名信息收集,版本检测,端口扫描等☆12Mar 10, 2019Updated 7 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆82Nov 13, 2021Updated 4 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- SIEM, Visibility, and Event-Driven Architecture Curated Solutions. Build a cost-effective threat detection and log management system.☆18Jan 17, 2024Updated 2 years ago
- asset scan engine☆19Aug 31, 2022Updated 3 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- ☠️ Python script and example file to test the Right-To-Left Override attack☆10Feb 25, 2019Updated 7 years ago
- Parse Chrome History and Downloads into TSV or TLN format☆16Sep 3, 2016Updated 9 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Burp Suite Configuration Tweak☆13Mar 15, 2024Updated 2 years ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- DictZip, GZip random access compression format(.dz), access library for Java☆12Jul 16, 2022Updated 3 years ago
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- ☆12Nov 25, 2024Updated last year
- A tiny script to convert your mdx dictionary file to CSV☆11Dec 22, 2018Updated 7 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- An API wrapper for @convertio (convertio.co) written in Python.☆12Jun 30, 2025Updated 8 months ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆20Mar 10, 2017Updated 9 years ago
- A Node.js console daemon application secured by MSAL Node and calling Microsoft Graph API via OAuth 2.0 client credentials flow☆28Nov 28, 2024Updated last year
- PoC that downloads an executable from public DNS servers☆20Jul 19, 2025Updated 8 months ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- Proof of concept python script for regreSSHion exploit.☆10Oct 19, 2024Updated last year
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago
- LaTeX Report Template for Offensive Security's OSCP Exam.☆14Mar 13, 2022Updated 4 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Jan 8, 2023Updated 3 years ago
- Self-deployed Straight-forward hacking lab machine which designed for new comer who want to learn Penetration Testing field that running …☆16Jul 23, 2024Updated last year
- ☆31Jun 7, 2021Updated 4 years ago
- Exchange ActiveSync Diagnostic Utility☆13Aug 28, 2014Updated 11 years ago
- Full python reverse shell and bind shell payloads☆16Apr 30, 2020Updated 5 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- A script for converting DSL format dictionaries compatible with GoldenDict to the Migaku Dictionary format.☆15May 9, 2025Updated 10 months ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago