☆12Aug 29, 2025Updated 6 months ago
Alternatives and similar repositories for shells-payloads
Users that are interested in shells-payloads are comparing it to the libraries listed below
Sorting:
- ☆30Aug 8, 2015Updated 10 years ago
- FTP server for MVS 3.8j☆12Nov 23, 2023Updated 2 years ago
- Collection of materials related to IBM z/OS security☆45Dec 14, 2015Updated 10 years ago
- z/OS (mainframe) Network Job Entry (NJE) python library and example scripts.☆28Mar 11, 2026Updated last week
- RACF Database Parser☆12Apr 4, 2024Updated last year
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- Privilege escalation tools on Mainframe☆84Aug 24, 2019Updated 6 years ago
- Python TN3270 library☆33Sep 6, 2025Updated 6 months ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- MVS version of Vasilis Vlachoudis awesome rexx implementation☆52Mar 4, 2026Updated 2 weeks ago
- Meraki monitoring through Zabbix☆10Jul 31, 2023Updated 2 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- A TN3270 emulator written in Angular and Javascript☆19Updated this week
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆28Nov 9, 2016Updated 9 years ago
- WAyereless Site SUrveying Program☆12Feb 9, 2016Updated 10 years ago
- ☆10May 8, 2016Updated 9 years ago
- Passive DNS visualization and Passive DNS server toolkit☆35Mar 22, 2012Updated 13 years ago
- z/OS - all things security☆86May 21, 2020Updated 5 years ago
- ☆18Oct 20, 2021Updated 4 years ago
- LPARDesign Tool - Helps in configuring your CPC for PR/SM and HiperDispatch☆10Jun 17, 2024Updated last year
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 7 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Docker base image for OpenWRT on ARM-based devices.☆12May 21, 2015Updated 10 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Python command-line client for put.io☆20Mar 8, 2011Updated 15 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago