DevoOverkill9 / shell_lover
A reverse shell cheat-sheet tool
☆39Updated 6 years ago
Alternatives and similar repositories for shell_lover:
Users that are interested in shell_lover are comparing it to the libraries listed below
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Hacking challenges☆31Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- WhiteBox CMS analysis☆69Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Linux setup tool for Kali Linux☆78Updated 6 years ago
- ☆52Updated 11 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆20Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- ☆59Updated 4 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆54Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- ☆21Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- ☆92Updated 2 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago