H0j3n / EzpzShellLinks
Collection Of Reverse Shell that can easily generate using Python3
☆60Updated last year
Alternatives and similar repositories for EzpzShell
Users that are interested in EzpzShell are comparing it to the libraries listed below
Sorting:
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 3 years ago
- Upload files done during my research.☆167Updated this week
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆58Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆41Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆21Updated 4 years ago
- Notes for CRTP☆42Updated 4 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 7 months ago
- Creates and sends fake meeting invite☆72Updated 4 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- HTTP verb tampering & methods enumeration☆63Updated 4 months ago
- ☆67Updated 3 years ago
- ☆33Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- ☆57Updated 3 years ago
- ☆42Updated 2 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆73Updated 2 years ago
- ☆66Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆24Updated 2 weeks ago
- Spoofcheck☆45Updated 6 months ago
- ☆61Updated 3 years ago
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- ☆74Updated this week
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆121Updated 3 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago