Jean-Francois-C / Webshell-Upload-and-Web-RCE-Techniques
Classic Web shell upload techniques & Web RCE techniques
β27Updated 3 months ago
Alternatives and similar repositories for Webshell-Upload-and-Web-RCE-Techniques:
Users that are interested in Webshell-Upload-and-Web-RCE-Techniques are comparing it to the libraries listed below
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- γπͺγLinux Backdoor based on ICMP protocolβ59Updated 2 months ago
- Enumeration & fingerprint toolβ24Updated 11 months ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 2 years ago
- A python approach to interacting with web shells.β29Updated 4 years ago
- Google Meet Phishing Template For Gophishβ45Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated last year
- Open-Source Phishing Toolkitβ18Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.β50Updated 3 weeks ago
- Pentesting notesβ17Updated last year
- Bash script to generate reverse shell payloadsβ19Updated last year
- β47Updated 2 years ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out πππβ16Updated 2 years ago
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50β24Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the serverβ46Updated 3 weeks ago
- Tactics, Techniques, and Proceduresβ25Updated last month
- Red Teaming & Active Directory Cheat Sheet.β39Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.β17Updated 2 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAVβ27Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.β47Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives uβ¦β10Updated 2 years ago
- Script to setup a phishing server on the cloudβ12Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitationβ38Updated last year
- A little cheatsheet for NetExecβ20Updated 9 months ago
- Simple recon tool automates your recon processβ16Updated last year
- WebApp intentionally made vulnerable to Race Condition for practicing Race Conditionβ25Updated 2 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modβ¦β19Updated 3 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.β32Updated last week
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systemsβ40Updated 4 years ago