My python3 implementation of a Forward Shell
☆37Jan 25, 2019Updated 7 years ago
Alternatives and similar repositories for FShell
Users that are interested in FShell are comparing it to the libraries listed below
Sorting:
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- Extract subdomains from rapiddns.io☆22Nov 24, 2022Updated 3 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- A simple polymorphic engine☆21Jun 5, 2020Updated 5 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 7 years ago
- All in one tool for ethical hacking and pen testing.☆13May 22, 2023Updated 2 years ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- ☆58Jun 28, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 10 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- AlMA.PRO.SPY - An open-source Botnet.☆15Jul 25, 2017Updated 8 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- ☆16Mar 31, 2017Updated 8 years ago