0xbad53c / webshells
My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the internet.
☆19Updated 10 months ago
Alternatives and similar repositories for webshells:
Users that are interested in webshells are comparing it to the libraries listed below
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆63Updated 3 years ago
- Parses Cobalt Strike malleable C2 profiles.☆51Updated last week
- Beacon Object Files.☆35Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated last year
- Active Directory certificate abuse.☆37Updated 3 years ago
- Python3 HTTP Server with upload functionality☆8Updated last year
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆38Updated last year
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆52Updated 3 years ago
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆22Updated 3 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆81Updated last year
- SAM Dumping in C#☆44Updated 2 months ago
- C# Tool to interact with MS Exchange based on MS docs☆99Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated last year
- Groovy Post Exploitation☆20Updated 5 months ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆13Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Updated 3 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 2 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆54Updated 11 months ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago