Jean-Francois-C / Webshell-Upload-and-Web-RCE-TechniquesLinks
Classic Web shell upload techniques & Web RCE techniques
β32Updated 9 months ago
Alternatives and similar repositories for Webshell-Upload-and-Web-RCE-Techniques
Users that are interested in Webshell-Upload-and-Web-RCE-Techniques are comparing it to the libraries listed below
Sorting:
- γπͺγLinux Backdoor based on ICMP protocolβ64Updated 8 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 3 years ago
- Automate converting webshells into reverse shells.β69Updated last month
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerabilityβ81Updated 2 years ago
- APK Infrastructure Investigatorβ63Updated 2 years ago
- Google Meet Phishing Template For Gophishβ45Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Linux Persistence Toolkitβ60Updated 2 years ago
- β43Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...β110Updated last year
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.β83Updated 2 months ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- Open-Source Phishing Toolkitβ19Updated 4 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).β61Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β87Updated last year
- Cloud Exploit Frameworkβ114Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β47Updated 2 years ago
- β41Updated last month
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives uβ¦β10Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.β56Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploitβ105Updated 2 years ago
- A collection of red blue team staffβ46Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350β51Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.β69Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β76Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talksβ65Updated 3 years ago
- β74Updated last year
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646β27Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2β¦β84Updated 2 years ago