JFR-C / Webshell-Upload-and-Web-RCE-TechniquesLinks
Classic Web shell upload techniques & Web RCE techniques
☆57Updated 2 months ago
Alternatives and similar repositories for Webshell-Upload-and-Web-RCE-Techniques
Users that are interested in Webshell-Upload-and-Web-RCE-Techniques are comparing it to the libraries listed below
Sorting:
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Updated 2 years ago
- ☆91Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆124Updated 4 months ago
- Automate converting webshells into reverse shells.☆71Updated 3 weeks ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆70Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- ☆76Updated 2 weeks ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- Exploits targeting vBulletin.☆75Updated 2 years ago
- ☆48Updated 2 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆96Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆78Updated this week
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- Metabase Pre-auth RCE☆12Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- Red Teaming tools and techniques☆56Updated 2 years ago