superkojiman / rfishell
Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.
☆46Updated 8 years ago
Alternatives and similar repositories for rfishell:
Users that are interested in rfishell are comparing it to the libraries listed below
- Advanced XPath Injection Tool☆34Updated 9 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- ☆52Updated 4 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- ☆26Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 10 months ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- ☆21Updated 8 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 8 years ago
- WhiteBox CMS analysis☆69Updated last year
- Automated enumeration☆30Updated 4 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Updated 4 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- ☆51Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- ☆56Updated 4 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆79Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago