All Projects → Jsshell → Similar Projects or Alternatives

943 Open source projects that are alternatives of or similar to Jsshell

Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-47.9%)
Mutual labels:  hacking
Hackingtool
ALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+4403.59%)
Mutual labels:  hacking
Eviltwinframework
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Stars: ✭ 122 (-26.95%)
Mutual labels:  hacking
Oscp
Collection of things made during my OSCP journey
Stars: ✭ 709 (+324.55%)
Mutual labels:  exploit
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (+667.07%)
Mutual labels:  exploit
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+318.56%)
Mutual labels:  hacking
Stuff
Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-12.57%)
Mutual labels:  exploit
Solved Hacking Problem
✔️ CTF problems and solutions solved by Qwaz
Stars: ✭ 67 (-59.88%)
Mutual labels:  hacking
Shellpop
Pop shells like a master.
Stars: ✭ 1,279 (+665.87%)
Mutual labels:  hacking
Spectre Attack
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (+313.17%)
Mutual labels:  exploit
Telekiller
A Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-26.95%)
Mutual labels:  hacking
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+305.39%)
Mutual labels:  hacking
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-47.9%)
Mutual labels:  exploit
Dymerge
🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (+0%)
Mutual labels:  hacking
Antimalware Research
Research on Anti-malware and other related security solutions
Stars: ✭ 163 (-2.4%)
Mutual labels:  exploit
Di.we.h
Repositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-6.59%)
Mutual labels:  hacking
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-16.17%)
Mutual labels:  hacking
Bypass Php Gd Process To Rce
Reference: http://www.secgeek.net/bookfresh-vulnerability/
Stars: ✭ 113 (-32.34%)
Mutual labels:  exploit
Fail2ban.webexploits
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-59.88%)
Mutual labels:  hacking
Textractor
Extracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (+292.81%)
Mutual labels:  hacking
Csgo Crash Exploit
Allows you to crash any Windows user
Stars: ✭ 87 (-47.9%)
Mutual labels:  exploit
Phishing Frenzy
Ruby on Rails Phishing Framework
Stars: ✭ 643 (+285.03%)
Mutual labels:  hacking
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-27.54%)
Mutual labels:  hacking
Joomscan
OWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+283.23%)
Mutual labels:  exploit
Hookso
linux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-47.9%)
Mutual labels:  hacking
Habu
Hacking Toolkit
Stars: ✭ 635 (+280.24%)
Mutual labels:  hacking
Mida Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-13.77%)
Mutual labels:  exploit
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-48.5%)
Mutual labels:  hacking
Latte
☕ Latte: the intuitive and fast template engine for those who want the most secure PHP sites.
Stars: ✭ 616 (+268.86%)
Mutual labels:  xss
Gofingerprint
GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-28.14%)
Mutual labels:  hacking
Attifyos
Attify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (+268.26%)
Mutual labels:  hacking
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+653.89%)
Mutual labels:  hacking
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+261.68%)
Mutual labels:  hacking
Charlatano
Proves JVM cheats are viable on native games, and demonstrates the longevity against anti-cheat signature detection systems
Stars: ✭ 599 (+258.68%)
Mutual labels:  hacking
Zynix Fusion
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-49.7%)
Mutual labels:  hacking
Zip
A portable, simple zip library written in C
Stars: ✭ 596 (+256.89%)
Mutual labels:  hacking
Goaltdns
A permutation generation tool written in golang
Stars: ✭ 119 (-28.74%)
Mutual labels:  hacking
Android Reports And Resources
A big list of Android Hackerone disclosed reports and other resources.
Stars: ✭ 590 (+253.29%)
Mutual labels:  xss
Windowsexploits
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Stars: ✭ 1,243 (+644.31%)
Mutual labels:  exploit
Mtpwn
PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (-14.37%)
Mutual labels:  exploit
Heap Viewer
An IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+243.71%)
Mutual labels:  exploit
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+3459.28%)
Mutual labels:  hacking
Bash scripting
bash scripting thing !
Stars: ✭ 118 (-29.34%)
Mutual labels:  hacking
Xray
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Stars: ✭ 6,218 (+3623.35%)
Mutual labels:  xss
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-52.1%)
Mutual labels:  hacking
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+232.93%)
Mutual labels:  hacking
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-3.59%)
Mutual labels:  hacking
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+229.94%)
Mutual labels:  hacking
Network Threats Taxonomy
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-52.69%)
Mutual labels:  hacking
Am I Affected By Meltdown
Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
Stars: ✭ 549 (+228.74%)
Mutual labels:  exploit
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-30.54%)
Mutual labels:  hacking
B1tifi
ssh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-61.08%)
Mutual labels:  hacking
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+1071.26%)
Mutual labels:  hacking
Rhme 2017
Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-61.08%)
Mutual labels:  hacking
Xshock
XSHOCK Shellshock Exploit
Stars: ✭ 65 (-61.08%)
Mutual labels:  hacking
Enteletaor
Message Queue & Broker Injection tool
Stars: ✭ 139 (-16.77%)
Mutual labels:  hacking
Brutemap
Let's find someone's account
Stars: ✭ 113 (-32.34%)
Mutual labels:  hacking
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+580.24%)
Mutual labels:  hacking
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+577.84%)
Mutual labels:  hacking
Virtualseccons
An ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-32.34%)
Mutual labels:  hacking
361-420 of 943 similar projects