H0j3n / EzpzShellLinks
Collection Of Reverse Shell that can easily generate using Python3
☆60Updated last year
Alternatives and similar repositories for EzpzShell
Users that are interested in EzpzShell are comparing it to the libraries listed below
Sorting:
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆56Updated 3 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆72Updated 2 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 2 years ago
- Upload files done during my research.☆166Updated 6 months ago
- ☆66Updated 2 years ago
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆41Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆115Updated 2 months ago
- Notes for CRTP☆41Updated 4 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- HTTP verb tampering & methods enumeration☆62Updated 2 months ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆29Updated 7 months ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- Reverse Shell-able Windows exploits short POCs.☆32Updated 5 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- ☆101Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆74Updated last year
- Sample Obsidian's vault for web pentesting☆99Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆127Updated 3 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 4 years ago