MrPineMan / Awesome-Reverse-Shell
A collection of reverse shells
☆31Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Awesome-Reverse-Shell
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆38Updated 3 years ago
- LDAP Swiss Army Knife☆43Updated 11 months ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆20Updated 4 years ago
- ☆45Updated 2 years ago
- Merge multiple nMap xml files into one☆49Updated 5 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 3 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆26Updated 2 years ago
- Ingest openldap data into bloodhound☆78Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆26Updated 3 weeks ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 3 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆66Updated last year
- ☆128Updated last year
- ☆54Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆37Updated 2 months ago
- Creates and sends fake meeting invite☆51Updated 3 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆217Updated 3 years ago
- An epic web shell☆84Updated 6 months ago
- SNIcat☆125Updated 3 years ago
- Red Team Resources☆59Updated 5 years ago
- Burp with Friends☆99Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago