LordWolfer / webshellsLinks
This is a compilation of various shells that I had found in the wild.
☆15Updated 12 years ago
Alternatives and similar repositories for webshells
Users that are interested in webshells are comparing it to the libraries listed below
Sorting:
- Code, commands, and chatter about Threat Hunting.☆35Updated 5 years ago
- ☆20Updated last year
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Projects and POCs☆60Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- Automatically scans for malicious proxies.☆29Updated 10 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- XXE attack tool☆31Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- cross site scripting framework plugin for metasploit☆17Updated 12 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Exploits and research stuffs☆54Updated last year
- EmPyre Web Interface☆12Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 10 years ago