Cyb3rMaddy / CAPTCHA-and-Reverse-Shell
What the name says....
☆86Updated last month
Related projects ⓘ
Alternatives and complementary repositories for CAPTCHA-and-Reverse-Shell
- Living Off The Land (LOTL) persistent Reverse shell☆93Updated 9 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆212Updated last month
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 2 years ago
- ☆99Updated 2 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆64Updated 3 weeks ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆71Updated last month
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated 8 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 3 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆51Updated 3 weeks ago
- Embed a payload inside a PNG file☆201Updated 2 weeks ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆156Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated 10 months ago
- Scripts for offensive security☆77Updated 2 months ago
- Lab used for workshop and CTF☆153Updated 3 weeks ago
- PowerShell Obfuscator☆88Updated 5 months ago
- Persistent Powershell backdoor tool {😈}☆109Updated 3 months ago
- Automation tool to testing and confirm the xss vulnerability.☆125Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 4 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 3 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆107Updated 3 months ago
- ☆58Updated 6 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆137Updated 5 months ago
- NetProbe: Network Probe☆149Updated last month
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆36Updated last month
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆108Updated last week
- notes and ramblings from my OSCP/PenTesting Studies☆67Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆280Updated last month
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 9 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆68Updated 2 years ago