Collection Of Reverse Shell that can easily generate using Python3
☆59Jan 25, 2024Updated 2 years ago
Alternatives and similar repositories for EzpzShell
Users that are interested in EzpzShell are comparing it to the libraries listed below
Sorting:
- ☆23Jul 16, 2022Updated 3 years ago
- Don't expect much :) Just expect to learn new things!☆64Mar 11, 2021Updated 4 years ago
- ☆61Jan 4, 2022Updated 4 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 3 weeks ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- ☆121Sep 13, 2023Updated 2 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆13Mar 6, 2023Updated 2 years ago
- CLI tool to interact with the BloodHound CE API☆69Jan 4, 2026Updated 2 months ago
- A simple tool to find dangling CNAMEs☆17Dec 7, 2023Updated 2 years ago
- ☆14Mar 6, 2025Updated 11 months ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆20Feb 16, 2026Updated 2 weeks ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Hackthebox tools☆12Mar 3, 2019Updated 7 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Nov 4, 2018Updated 7 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Feb 14, 2022Updated 4 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆65Apr 13, 2021Updated 4 years ago
- ☆38Jun 19, 2021Updated 4 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- macOS Initial Access Payload Generator☆324Jan 10, 2024Updated 2 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Dec 18, 2019Updated 6 years ago
- .NET deserialization hunter☆82Jul 21, 2024Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆569Jan 20, 2026Updated last month
- Powerview on steroids☆875Updated this week
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- ☆18Nov 4, 2021Updated 4 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆83Jun 25, 2021Updated 4 years ago