tennc / webshell
This is a webshell open source project
☆10,345Updated 4 months ago
Alternatives and similar repositories for webshell:
Users that are interested in webshell are comparing it to the libraries listed below
- Webshell && Backdoor Collection☆1,881Updated 5 years ago
- Weaponized web shell☆3,293Updated 6 months ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,281Updated 3 years ago
- Common PHP webshells you might need for your Penetration Testing assignments or CTF challenges. Do not host the file(s) on your server!☆1,899Updated 4 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,076Updated last month
- pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.☆3,708Updated last month
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,606Updated 3 months ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,409Updated 4 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,922Updated last year
- Web application fuzzer☆6,149Updated 8 months ago
- Web path scanner☆12,804Updated 2 months ago
- Linux privilege escalation auditing tool☆5,909Updated last year
- ✍️ A curated list of CVE PoCs.☆3,391Updated 3 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,762Updated last year
- A `.git` folder disclosure exploit☆3,325Updated 2 years ago
- A fast sub domain brute tool for pentesters☆3,540Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,156Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,055Updated 2 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,495Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,782Updated 3 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,774Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,053Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,245Updated this week
- 🔥 Web-application firewalls (WAFs) from security standpoint.☆6,611Updated 5 months ago
- List of Awesome CobaltStrike Resources☆4,128Updated last year
- SQLI labs to test error based, Blind boolean based, Time based.☆5,439Updated last year
- 中国蚁剑是一款跨平台的开源网站管理工具。AntSword is a cross-platform website management toolkit.☆4,010Updated 3 months ago
- Advanced vulnerability scanning with Nmap NSE☆3,601Updated 7 months ago
- Adversary Emulation Framework☆9,240Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,861Updated this week