strund3r / Attack-Shell
Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back Connect, Bind Shell, Back Connect, Auto Rooter etc.
☆15Updated 7 years ago
Alternatives and similar repositories for Attack-Shell:
Users that are interested in Attack-Shell are comparing it to the libraries listed below
- Go command line app to exploit file upload vulnerability☆12Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- Various pentest scripts☆14Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- A cross-platform Java based Facebook social engineering framework, sends friend requests to a list of Facebook profiles, and polls for th…☆9Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- EmPyre Web Interface☆12Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Search bing with python☆12Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago