0bfxgh0st / ShellStormLinks
Automatic reverse/bind shell generator cheat sheet.
☆34Updated 2 years ago
Alternatives and similar repositories for ShellStorm
Users that are interested in ShellStorm are comparing it to the libraries listed below
Sorting:
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 2 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆62Updated 3 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 8 months ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆70Updated 4 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆118Updated last year
- on-the-fly☆85Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Command Execution exploiter with an auto connection handling☆33Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago