JFR-C / Webshell-Upload-and-Web-RCE-TechniquesLinks
Classic Web shell upload techniques & Web RCE techniques
β38Updated 10 months ago
Alternatives and similar repositories for Webshell-Upload-and-Web-RCE-Techniques
Users that are interested in Webshell-Upload-and-Web-RCE-Techniques are comparing it to the libraries listed below
Sorting:
- γπͺγLinux Backdoor based on ICMP protocolβ63Updated 9 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploitβ104Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...β112Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.β48Updated 2 years ago
- β74Updated last year
- Cloud Exploit Frameworkβ114Updated 3 years ago
- β44Updated 2 years ago
- APK Infrastructure Investigatorβ64Updated 2 years ago
- Automate converting webshells into reverse shells.β70Updated this week
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticalsβ¦β67Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β47Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.β70Updated last year
- β92Updated 2 years ago
- A collection of red blue team staffβ47Updated 2 years ago
- Tools used for Pentestingβ22Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.β76Updated last year
- Evade the boys in blue and acquire a reverse shell using powercat v2.0β59Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β110Updated 2 years ago
- The great Microsoft exchange hack: A penetration testerβs guide (exchange penetration testing)β112Updated last month
- ElasticSearch exploit and Pentesting guide for penetration testerβ29Updated 2 years ago
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ163Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2β¦β84Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β87Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350β52Updated 2 years ago
- Tool for enumerating Active Directory environmentsβ50Updated 2 years ago
- Exploits targeting vBulletin.β75Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).β61Updated last year
- quick and dirty proof-of-concept to hide shells in imagesβ50Updated last year