JFR-C / Webshell-Upload-and-Web-RCE-TechniquesLinks
Classic Web shell upload techniques & Web RCE techniques
β52Updated 2 months ago
Alternatives and similar repositories for Webshell-Upload-and-Web-RCE-Techniques
Users that are interested in Webshell-Upload-and-Web-RCE-Techniques are comparing it to the libraries listed below
Sorting:
- γπͺγLinux Backdoor based on ICMP protocolβ63Updated last year
- Automate converting webshells into reverse shells.β71Updated 3 weeks ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.β48Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.β70Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.β77Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploitβ106Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β90Updated last year
- β74Updated last year
- The great Microsoft exchange hack: A penetration testerβs guide (exchange penetration testing)β120Updated 3 months ago
- β47Updated 2 months ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0β60Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β119Updated 2 years ago
- β57Updated 3 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerabilityβ80Updated 2 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format wβ¦β36Updated 3 months ago
- ElasticSearch exploit and Pentesting guide for penetration testerβ29Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...β113Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.β63Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Updated 2 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.β84Updated 3 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago
- β91Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2β¦β85Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.β39Updated 3 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosureβ90Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eacβ¦β68Updated 11 months ago
- MOVEit CVE-2023-34362β138Updated 2 years ago