Is command prompt blocked on your school/work computers? Here is an easy fix!
☆21Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for CMD_Bypass
Users that are interested in CMD_Bypass are comparing it to the libraries listed below
Sorting:
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆27Aug 16, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Feb 25, 2023Updated 3 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Query Shodan and Censys data for fast parsing☆39Aug 7, 2018Updated 7 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- HTTP(S) directory/file brute forcer☆21Feb 22, 2023Updated 3 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- The Best Linewize Hacks/Mods to Date☆12Apr 30, 2023Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago