Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.
☆46Oct 1, 2016Updated 9 years ago
Alternatives and similar repositories for rfishell
Users that are interested in rfishell are comparing it to the libraries listed below
Sorting:
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Local GOLANG Transform Wrapper for Maltego☆17Feb 25, 2016Updated 10 years ago
- scrapes Linkedin for company employee profiles☆57Mar 8, 2017Updated 9 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆327May 4, 2021Updated 4 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆15Mar 27, 2025Updated 11 months ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Apr 11, 2017Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- Probe Zero project - see Ndh2K16☆13Jul 3, 2016Updated 9 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Jan 1, 2017Updated 9 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆20Dec 3, 2017Updated 8 years ago
- ☆63Oct 29, 2012Updated 13 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- A search tool for IDA☆70Nov 26, 2016Updated 9 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- Try various exploits to get root☆19Nov 14, 2013Updated 12 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- ☆36Jul 13, 2016Updated 9 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Changes for Visual Studio 2013☆119Jun 22, 2015Updated 10 years ago