DeaDHackS / Evil-Shock
Shock the shell! Exploit many injection method for shellshock
☆17Updated 6 years ago
Related projects: ⓘ
- This contains common OSCP local exploits and enumeration scripts☆9Updated 9 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- ☆15Updated last year
- Automated Payload Test Controller☆9Updated 7 years ago
- ☆23Updated this week
- ☆20Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 4 years ago
- ☆13Updated this week
- Random code snippets☆9Updated 10 months ago
- Automated script to search in SMB protocol for availables pipe names☆21Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆15Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 4 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Methods of C2☆21Updated 9 years ago
- ☆24Updated this week
- ☆16Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆22Updated 10 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆13Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- ☆25Updated 3 years ago