0bfxgh0st / ShellStormLinks
Automatic reverse/bind shell generator cheat sheet.
☆34Updated 2 years ago
Alternatives and similar repositories for ShellStorm
Users that are interested in ShellStorm are comparing it to the libraries listed below
Sorting:
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 3 months ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 9 months ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Interactive navi redteam cheats☆32Updated last month
- Classic Web shell upload techniques & Web RCE techniques☆36Updated 10 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- A WLAN red team framework.☆157Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Linux Persistence Toolkit☆66Updated 2 years ago
- ☆44Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated 2 years ago
- A powerful and delightful PHP WebShell☆65Updated 7 months ago
- OSCP Study Guide☆40Updated 2 years ago