LukeDSchenk / rust-backdoorsLinks
More bind and reverse shells! This time written in Rust.
☆53Updated 2 years ago
Alternatives and similar repositories for rust-backdoors
Users that are interested in rust-backdoors are comparing it to the libraries listed below
Sorting:
- RedLizard Rust TCP Reverse Shell Server/Client☆138Updated last year
- Linux Persistence Toolkit☆66Updated 2 years ago
- ☆92Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆45Updated last year
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆95Updated 3 years ago
- Collection of username lists for enumerating kerberos domain users☆100Updated 7 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆59Updated 2 years ago
- SSTI Payload Generator☆91Updated 3 years ago
- ☆44Updated 2 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆115Updated 2 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- rcat☆71Updated 3 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆163Updated 3 years ago
- Creates and sends fake meeting invite☆70Updated 4 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- ☆122Updated 2 years ago
- Spoofcheck☆39Updated 4 months ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆192Updated last month
- Linux Enumeration / Privilege escalation tool☆25Updated 5 years ago
- Impersonating authentication over HTTP and/or named pipes.☆139Updated 4 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆108Updated last year
- Windows reverse shell GUI☆102Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆16Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- Handy Stored Password Decryption Techniques☆156Updated 4 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year