Command Execution exploiter with an auto connection handling
☆31Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for PwnShell
Users that are interested in PwnShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- ☆11Jun 19, 2024Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CTF exploit development and other tools of pwnage☆18May 30, 2019Updated 6 years ago
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- MIRAI botnet in python3☆19Jun 18, 2019Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- Backdooring Claude Code via hooks in settings.json. Authorized use only!☆65Apr 16, 2026Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cve and Exploit Finder on the target☆26May 8, 2022Updated 3 years ago
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- Check if domain has bug bounty program or not☆28Jul 28, 2023Updated 2 years ago
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆15Jul 29, 2021Updated 4 years ago
- Various scripts & tools☆12Apr 22, 2024Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- ☆26Jun 2, 2023Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- A collection of payloads for different vulnerabilities, best payload lists in one repository☆17Jul 28, 2021Updated 4 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Create Kali Linux VM with i3 using Vagrant and Ansible☆16Feb 18, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- ☆20Aug 3, 2022Updated 3 years ago
- Termux interactive package installer☆14Feb 2, 2026Updated 3 months ago
- Packer and Vagrant configurations for Kali Linux☆14Jun 26, 2021Updated 4 years ago
- Python script to create Termux packages easily.☆13Feb 8, 2022Updated 4 years ago