WhiteWinterWolf / wwwolf-php-webshell
WhiteWinterWolf's PHP web shell
☆646Updated 7 years ago
Alternatives and similar repositories for wwwolf-php-webshell:
Users that are interested in wwwolf-php-webshell are comparing it to the libraries listed below
- Compiled Binaries for Ghostpack☆1,305Updated 5 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,113Updated 10 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆620Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆522Updated 3 years ago
- ☆203Updated 10 years ago
- Windows Local Privilege Escalation from Service Account to System☆782Updated 5 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆288Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,298Updated last week
- Powershell tool to automate Active Directory enumeration.☆1,087Updated 2 weeks ago
- Simple php reverse shell implemented using binary .☆409Updated last year
- Username tools for penetration testing☆990Updated 6 months ago
- ☆216Updated 4 years ago
- ☆1,100Updated 3 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆480Updated last year
- ☆208Updated 4 years ago
- Abusing impersonation privileges through the "Printer Bug"☆1,963Updated 4 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,098Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,578Updated last week
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,588Updated 4 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,438Updated last week
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆612Updated 4 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆859Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,073Updated 4 years ago
- JAWS - Just Another Windows (Enum) Script☆1,763Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,234Updated last year
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,057Updated 2 years ago
- Windows AV Evasion☆771Updated 5 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,243Updated last year
- Windows Privilege Escalation Techniques and Scripts☆857Updated 5 years ago
- MS17-010☆269Updated 2 years ago