Command Execution exploiter with an auto connection handling
☆32Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for PwnShell
Users that are interested in PwnShell are comparing it to the libraries listed below
Sorting:
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A collection of payloads for different vulnerabilities, best payload lists in one repository☆17Jul 28, 2021Updated 4 years ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆16Feb 4, 2019Updated 7 years ago
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Integrate static security testing with HCL AppScan CodeSweep with Github.☆22Jul 18, 2025Updated 7 months ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Jun 18, 2023Updated 2 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆23Jun 25, 2023Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- ☆84Aug 18, 2022Updated 3 years ago
- A tech enumeration toolkit focused on 404 Not found pages.☆26Oct 6, 2024Updated last year
- ☆25Jun 2, 2023Updated 2 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- CVE-2022-41040 nuclei template☆19Oct 2, 2022Updated 3 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- MIRAI botnet in python3☆20Jun 18, 2019Updated 6 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Jun 12, 2023Updated 2 years ago
- PHP tool to test XSS☆22Nov 5, 2019Updated 6 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- PoC for the CVE-2023-49103☆30Dec 2, 2023Updated 2 years ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆67Nov 23, 2025Updated 3 months ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- Automation for Open Threat Exchange☆24Mar 16, 2024Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ☆33Jul 4, 2023Updated 2 years ago