D3Ext's Forward Shell
☆120Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for DFShell
Users that are interested in DFShell are comparing it to the libraries listed below
Sorting:
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 6 months ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- A Command and Control (C2)☆302May 4, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- CVE-2022-29221 Proof of Concept Code - Smarty RCE☆16May 25, 2022Updated 3 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Jul 26, 2022Updated 3 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆270Sep 26, 2023Updated 2 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆277Apr 4, 2023Updated 2 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Multiplatform Python WebShell☆319Nov 24, 2025Updated 3 months ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆227Jan 31, 2025Updated last year
- PowerShell SOCKS proxy with reverse proxy capabilities☆84Apr 23, 2021Updated 4 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- Exploits targeting vBulletin.☆75Apr 15, 2023Updated 2 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆111May 12, 2023Updated 2 years ago
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago