0bfxgh0st / ShellStorm
Automatic reverse/bind shell generator cheat sheet.
☆35Updated 2 years ago
Alternatives and similar repositories for ShellStorm:
Users that are interested in ShellStorm are comparing it to the libraries listed below
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆48Updated 3 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆42Updated 2 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆35Updated last year
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- ☆49Updated this week
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆14Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆66Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆85Updated 8 months ago
- ☆26Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆51Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆41Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 3 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 8 months ago