Caesarovich / rome-webshellLinks
A powerful and delightful PHP WebShell
☆64Updated 5 months ago
Alternatives and similar repositories for rome-webshell
Users that are interested in rome-webshell are comparing it to the libraries listed below
Sorting:
- A proof of concept email spoofing tool built on Docker.☆128Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆56Updated 7 months ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆59Updated 2 years ago
- Automate converting webshells into reverse shells.☆69Updated last month
- Yet Another PHP Shell - The most complete PHP reverse shell☆83Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆78Updated last year
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 5 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 11 months ago
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 4 months ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆37Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆74Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆160Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆32Updated 9 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- Creates and sends fake meeting invite☆68Updated 4 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆93Updated 11 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆105Updated 10 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- linikatz is a tool to attack AD on UNIX☆149Updated last year