66 skills found · Page 1 of 3
mubix / Shellshocker PocsCollection of Proof of Concepts and Potential Targets for #ShellShocker
hannob / Bashchecktest script for shellshocker and related vulnerabilities
nccgroup / ShockerA tool to find and exploit servers vulnerable to Shellshock
opsxcq / Exploit CVE 2014 6271Shellshock exploit + vulnerable environment
MrCl0wnLab / ShellShockHunterIt's a simple tool for test vulnerability shellshock
zaf / SipshockA scanner for SIP proxies vulnerable to Shellshock
wreiske / ShellshockerThe code behind https://shellshocker.net/
monokal / ShellshockPrint a colourful random message in your Shell. For example, fun to add to SSH login/logout.
Swordfish-Security / Pentest In DockerDocker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
capture0x / XSHOCKXSHOCK Shellshock Exploit
byt3bl33d3r / DHCPShockSpoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug
scottjpack / Shellshock ScannerPython Scanner for "ShellShock" (CVE-2014-6271)
DanMcInerney / Shellshock HunterConcurrently test bing results for shellshock vulnerability
gry / Shellshock ScannerA simple Shellshock scanner in python
cheetz / IcmpshockA scanning tool for the ShellShock bash vulnerability
PacAnimal / ShellshockA spaceshooter game in Bash
DanMcInerney / Shellshock Hunter GoogleSearch google for shellshock vulnerable sites
NullArray / ShellshockerA Bash script to test a list of URLs for the shellshock vulnerability.
hmlio / Vaas Cve 2014 6271Vulnerability as a service: showcasing CVS-2014-6271, a.k.a. Shellshock
iuristanchev / Pentesting ToolsFor educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation or perls to generate such. nmap_scans - is for some ready to use nmap scannings. other_scans - scripts that can be used for scanning if nothing else is availible. post - is for post exploatation. shellshock - is a script to get use of the shellshock vulnarability. tools - are other tools. If any questions please ask at iuri.stanchev@gmail.com