D3Ext's Forward Shell
☆120Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for DFShell
Users that are interested in DFShell are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 7 months ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- CVE-2022-29221 Proof of Concept Code - Smarty RCE☆16May 25, 2022Updated 3 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- A Command and Control (C2)☆302May 4, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 3 weeks ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆270Sep 26, 2023Updated 2 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆84Apr 23, 2021Updated 4 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆816Mar 31, 2024Updated last year
- A python script to dump files and folders remotely from a Windows SMB share.☆229Jan 31, 2025Updated last year
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 2 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- ☆132Jan 25, 2023Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Jul 26, 2022Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆277Apr 4, 2023Updated 2 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆101Jul 20, 2023Updated 2 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- Multiplatform Python WebShell☆319Nov 24, 2025Updated 3 months ago
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago