Self contained htaccess shells and attacks
☆1,077Feb 17, 2022Updated 4 years ago
Alternatives and similar repositories for htshells
Users that are interested in htshells are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,140Apr 21, 2024Updated last year
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,784Sep 29, 2025Updated 6 months ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,170May 26, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- ODAT: Oracle Database Attacking Tool☆1,748Mar 31, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Deserialization payload generator for a variety of .NET formatters☆3,706Dec 23, 2024Updated last year
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,733Dec 1, 2024Updated last year
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,285Aug 18, 2025Updated 7 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,468Oct 1, 2025Updated 6 months ago
- SMBMap is a handy SMB enumeration tool☆2,026Jan 6, 2026Updated 3 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,523Sep 4, 2025Updated 7 months ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,161Mar 6, 2025Updated last year
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,650Sep 3, 2023Updated 2 years ago
- PowerShell Pass The Hash Utils☆1,745Dec 9, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,913Sep 27, 2021Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,942Nov 19, 2025Updated 4 months ago
- Weaponized web shell☆3,504Oct 1, 2025Updated 6 months ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,702Dec 12, 2024Updated last year
- HTTP parameter discovery suite.☆6,184Feb 20, 2025Updated last year
- DotDotPwn - The Directory Traversal Fuzzer☆1,109Sep 28, 2022Updated 3 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,700Apr 4, 2026Updated last week
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,341Apr 18, 2023Updated 2 years ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Post Exploitation Collection☆1,572May 1, 2020Updated 5 years ago
- Miscellaneous exploit code☆1,568Oct 6, 2023Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,188May 11, 2023Updated 2 years ago
- This tool can be used to brute discover GET and POST parameters☆1,393Aug 24, 2019Updated 6 years ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,476May 1, 2025Updated 11 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,485Oct 12, 2024Updated last year
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,869Nov 10, 2023Updated 2 years ago
- A Tool for Domain Flyovers☆5,921May 22, 2022Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,679Jan 5, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆2,320Dec 8, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,837Dec 4, 2025Updated 4 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,851Apr 25, 2024Updated last year
- A tool for embedding XXE/XML exploits into different filetypes☆1,139Dec 16, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- Exploitation for XSS☆730Aug 5, 2021Updated 4 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago