H0j3n / EzpzShell
Collection Of Reverse Shell that can easily generate using Python3
☆57Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for EzpzShell
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- A Python based ingestor for BloodHound☆81Updated 2 years ago
- Review of AWAE.OSWE☆30Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- Notes for CRTP☆39Updated 3 years ago
- OSWE Preparation☆37Updated 5 years ago
- ☆30Updated 4 years ago
- Spoofcheck☆24Updated last month
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated last week
- OSCP guide and Red Team assessment Guide☆33Updated 4 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆19Updated 2 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- ☆46Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- ☆25Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆40Updated 4 months ago
- offensive notes & resources☆40Updated last week
- Template used for my OSCP exam.☆26Updated 2 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆26Updated 9 months ago
- Becoming the spider, crawling through the webs to catch the fly.☆72Updated 3 years ago
- C2 Automation using Linode☆78Updated 2 years ago
- ☆15Updated 6 months ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- Upload files done during my research.☆129Updated 2 months ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆51Updated last year
- ☆44Updated 5 months ago
- ☆41Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆36Updated last year
- A list of "secrets" from JWT sample code and readme files.☆51Updated 4 years ago