A simple reverse and as well a webshell that recognices the OS (Windows/Linux).
☆18Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for JSP-Reverse-and-Web-Shell
Users that are interested in JSP-Reverse-and-Web-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- Process Hollowing Detection on a live system☆14Nov 11, 2017Updated 8 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Jan 24, 2025Updated last year
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 3 months ago
- 参照xffhelper源码修改,结合了fakeip的功能,生成jar包,不再需要py支持☆14Jun 10, 2021Updated 4 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- File upload/download with Spring Boot and MongoDB GridFS☆11Oct 26, 2022Updated 3 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 3 months ago
- My collection of various of JSP Webshell.☆38Jul 24, 2022Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 10 years ago
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- Risk Management Platform for the Military |🏅국방부장관상(Minister of National Defense Award)☆22Jul 7, 2024Updated last year
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆11Dec 16, 2017Updated 8 years ago
- Simple veracrypt container cracker using wordlist☆17May 14, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated 2 years ago
- ☆29Sep 27, 2020Updated 5 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- RCE Exploit For Maltrail-v0.53☆56Apr 25, 2026Updated last week
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆20Nov 14, 2024Updated last year
- Windows Privilege Escalation☆24Jun 7, 2022Updated 3 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 3 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- ☆190May 29, 2023Updated 2 years ago
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆16Sep 15, 2022Updated 3 years ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆32Mar 27, 2025Updated last year