JFR-C / Webshell-Upload-and-Web-RCE-TechniquesLinks
Classic Web shell upload techniques & Web RCE techniques
☆61Updated 4 months ago
Alternatives and similar repositories for Webshell-Upload-and-Web-RCE-Techniques
Users that are interested in Webshell-Upload-and-Web-RCE-Techniques are comparing it to the libraries listed below
Sorting:
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆129Updated 5 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- ☆49Updated 4 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- ☆79Updated last week
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆71Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Updated 3 years ago
- Automate converting webshells into reverse shells.☆72Updated 3 weeks ago
- ☆90Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Updated last year
- MOVEit CVE-2023-34362☆139Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- Web Hacking and Red Teaming MindMap☆78Updated last month
- Apache Spark Shell Command Injection Vulnerability☆88Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆137Updated 2 years ago
- ☆22Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago
- ☆27Updated 4 years ago