0xR0 / shellverLinks
Reverse Shell Cheat Sheet TooL
☆298Updated 5 years ago
Alternatives and similar repositories for shellver
Users that are interested in shellver are comparing it to the libraries listed below
Sorting:
- Search Exploitable Software on Linux☆232Updated 2 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆276Updated 7 years ago
- Pip install exploit package☆156Updated 6 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 5 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆196Updated 5 years ago
- Social Engineering Tool☆190Updated 7 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆437Updated last year
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆147Updated 6 years ago
- ☆208Updated 4 years ago
- an asynchronous target enumeration tool☆245Updated 2 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆223Updated last year
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 4 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆169Updated 5 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆424Updated 5 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 7 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆369Updated 5 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆349Updated 4 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆266Updated 7 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 6 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- rce exploit , made to work with pocsuite3☆122Updated 6 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆330Updated 2 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆276Updated last year
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆297Updated 6 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 5 years ago