Caesarovich / rome-webshellLinks
A powerful and delightful PHP WebShell
☆65Updated 10 months ago
Alternatives and similar repositories for rome-webshell
Users that are interested in rome-webshell are comparing it to the libraries listed below
Sorting:
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated 2 years ago
- Automate converting webshells into reverse shells.☆71Updated 3 weeks ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated last month
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Linux Persistence Toolkit☆73Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆58Updated 2 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Creates and sends fake meeting invite☆73Updated 4 years ago
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- A C2 framework built for my bachelors thesis☆54Updated 3 weeks ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 11 months ago