0xbad53c / webshellsLinks
My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the internet.
☆21Updated last year
Alternatives and similar repositories for webshells
Users that are interested in webshells are comparing it to the libraries listed below
Sorting:
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- Beacon Object Files.☆36Updated last year
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 5 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 3 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Updated 5 years ago
- ☆16Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 5 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Updated 2 years ago
- ☆53Updated 3 years ago
- Winsocket for Cobalt Strike.☆102Updated 2 years ago
- CVE-2024-40711-exp☆42Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆37Updated 10 months ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated 2 years ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆53Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- ownCloud exploits for CVE-2023-49105☆36Updated 2 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Updated 2 years ago
- Modified version of Pypykatz to print encrypted credentials☆55Updated 3 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆19Updated 4 years ago
- .NET 4.0 Fast Directory / File Lister☆27Updated 5 years ago