Nickguitar / RevCATLinks
OpenCATS <= 0.9.4 RCE (CVE-2021-41560)
☆11Updated 3 years ago
Alternatives and similar repositories for RevCAT
Users that are interested in RevCAT are comparing it to the libraries listed below
Sorting:
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Repository of tools used in my blog☆51Updated last year
- Yet Another PHP Shell - The most complete PHP reverse shell☆83Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆48Updated 9 months ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last month
- A reverse TCP payload and listener both written in python3.☆31Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- Anubis 7.0☆27Updated 11 months ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated 2 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- 🎞 lan and wifi interception. Gnu/Linux Version☆17Updated 4 years ago
- A Simple Script For SSH BruteForce☆37Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆27Updated 9 months ago
- https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8☆58Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Local File Inclusion Scanner and Exploiter☆15Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆63Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- SMTP Open Relay Exploitation☆15Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago