Caesarovich / rome-webshellLinks
A powerful and delightful PHP WebShell
☆67Updated 11 months ago
Alternatives and similar repositories for rome-webshell
Users that are interested in rome-webshell are comparing it to the libraries listed below
Sorting:
- Classic Web shell upload techniques & Web RCE techniques☆61Updated 4 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 2 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Automate converting webshells into reverse shells.☆72Updated 3 weeks ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Updated 3 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 8 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- ☆90Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Updated 3 years ago
- ☆49Updated 3 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- My Favorite Offensive Security Scripts☆83Updated 9 months ago
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆129Updated 5 months ago
- ☆61Updated 4 years ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- A C2 framework built for my bachelors thesis☆57Updated 3 weeks ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year