strund3r / Attack-Shell
Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back Connect, Bind Shell, Back Connect, Auto Rooter etc.
☆15Updated 7 years ago
Alternatives and similar repositories for Attack-Shell:
Users that are interested in Attack-Shell are comparing it to the libraries listed below
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- ☆16Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- library and intepreter for penetration testing tools☆29Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 8 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago