0xbad53c / webshellsLinks
My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the internet.
☆20Updated last year
Alternatives and similar repositories for webshells
Users that are interested in webshells are comparing it to the libraries listed below
Sorting:
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Beacon Object Files.☆35Updated last year
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated 7 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- ☆53Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆26Updated last year
- ☆17Updated 2 years ago
- Remotely dump NT hashes through Windows Crash dumps☆27Updated 7 months ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- CVE-2024-40711-exp☆42Updated 8 months ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆33Updated 3 months ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆40Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- Groovy Post Exploitation☆20Updated 8 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- AD Pentest Cheatsheet by BlackWasp☆21Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆58Updated last week