A simple reverse and as well a webshell that recognices the OS (Windows/Linux).
☆18Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for JSP-Reverse-and-Web-Shell
Users that are interested in JSP-Reverse-and-Web-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Jan 24, 2025Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated 2 weeks ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 2 months ago
- 参照xffhelper源码修改,结合了fakeip的功能,生成jar包,不再需要py支持☆14Jun 10, 2021Updated 4 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 11 months ago
- This is a python implementation of cell phone tracking using based on the assigned phone number from the service provider and geo-locatio…☆13May 31, 2022Updated 3 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- My collection of various of JSP Webshell.☆37Jul 24, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- HYDRAX, Advanced Malware Generation, Stealth and Evasion Techniques, Exploit Development, Botnet Command and Control (C&C), Payload Custo…☆27Dec 9, 2024Updated last year
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- 一个各类漏洞POC知识库☆16May 29, 2025Updated 10 months ago
- Simple veracrypt container cracker using wordlist☆17May 14, 2021Updated 4 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated 2 years ago
- ☆29Sep 27, 2020Updated 5 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆63Nov 16, 2022Updated 3 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago
- ".ashx" Web Shell☆16Aug 18, 2014Updated 11 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 3 weeks ago
- ☆20Nov 14, 2024Updated last year
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 3 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆189May 29, 2023Updated 2 years ago
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆16Sep 15, 2022Updated 3 years ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- SeManageVolumePrivilege to SYSTEM☆149Nov 22, 2023Updated 2 years ago
- ☆52Oct 10, 2025Updated 6 months ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated last month
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago