Classic Web shell upload techniques & Web RCE techniques
☆63Oct 4, 2025Updated 5 months ago
Alternatives and similar repositories for Webshell-Upload-and-Web-RCE-Techniques
Users that are interested in Webshell-Upload-and-Web-RCE-Techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Native application for Nekoya ~☆10Nov 18, 2023Updated 2 years ago
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Feb 9, 2023Updated 3 years ago
- ☆10Jul 19, 2016Updated 9 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- 【 Unity x Live2d x NaverClova x DL 】 Personal Assistant bot that has an avatar from Live2d and connecting it with Unity☆10Dec 1, 2023Updated 2 years ago
- All-languages fork bombs☆14Jan 2, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- ☆16Mar 2, 2025Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆13Apr 21, 2022Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Analyze an APK archive.☆28Feb 24, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- WebViewApp☆13Mar 20, 2016Updated 10 years ago
- XTEAM API☆12Jun 13, 2022Updated 3 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- ☆14Jul 29, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- Tools required to build Garuda images (mirrored from GitLab)☆20Mar 8, 2026Updated 3 weeks ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆23Oct 31, 2024Updated last year
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago