MrPineMan / Awesome-Reverse-ShellLinks
A collection of reverse shells
☆33Updated 6 years ago
Alternatives and similar repositories for Awesome-Reverse-Shell
Users that are interested in Awesome-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆139Updated last year
- Linux privilege escalation via LXD☆141Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 6 months ago
- Merge multiple nMap xml files into one☆49Updated 6 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- LD_PRELOAD rootkit☆137Updated last year
- LDAP Swiss Army Knife☆50Updated 2 years ago
- Posts about different topics☆39Updated 5 months ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆226Updated 4 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 5 years ago
- SNIcat☆128Updated 4 years ago
- ☆54Updated 4 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- ☆120Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated this week
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Updated 10 months ago
- ☆50Updated 3 years ago
- Linux Persistence Toolkit☆73Updated 3 years ago