Jean-Francois-C / Webshell-Upload-and-Web-RCE-Techniques
Classic Web shell upload techniques & Web RCE techniques
☆23Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Webshell-Upload-and-Web-RCE-Techniques
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- A little cheatsheet for NetExec☆16Updated 6 months ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Updated 2 years ago
- ☆21Updated last year
- A python approach to interacting with web shells.☆29Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- ☆46Updated 2 years ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆32Updated 3 weeks ago
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆32Updated 11 months ago
- Pentesting notes☆17Updated last year
- Super organized and flexible script for sending phishing campaigns☆54Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆27Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆23Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 8 months ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Updated 3 years ago
- ☆12Updated last year
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- ☆27Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 3 months ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago