Collection of reverse shells
☆56Oct 31, 2020Updated 5 years ago
Alternatives and similar repositories for Awsome-shells
Users that are interested in Awsome-shells are comparing it to the libraries listed below
Sorting:
- scrapy website Article and link ...☆15Dec 13, 2020Updated 5 years ago
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆24Jan 26, 2026Updated last month
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆30Dec 27, 2019Updated 6 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆10Mar 18, 2019Updated 6 years ago
- Another Go Shellcode Loader using Windows APIs☆141Nov 4, 2021Updated 4 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆355Apr 15, 2023Updated 2 years ago
- Webshell with the newest, easiest, and shortest code and technique.☆10Oct 23, 2021Updated 4 years ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- a collection of bash script and python to automate ZAP Security Tests☆11Oct 31, 2020Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- PyBurp is a Burp Suite extension that provides predefined Python functions for HTTP/WebSocket traffic modification, context menu registra…☆38Dec 28, 2025Updated 2 months ago
- Ping Exfiltration Command and Control (PiX-C2)☆32May 15, 2015Updated 10 years ago
- Enterprise Security Response Center Development Framework☆11Jan 2, 2017Updated 9 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆78Jan 18, 2018Updated 8 years ago
- 启动一个system权限的cmd☆12Apr 23, 2021Updated 4 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Dec 15, 2023Updated 2 years ago
- CVE-2020-2021☆22Oct 12, 2020Updated 5 years ago
- Golang reverse/bind shell generator☆229Jan 3, 2022Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Feb 12, 2021Updated 5 years ago
- ☆11Aug 1, 2016Updated 9 years ago
- 非涉密源码☆19Mar 13, 2024Updated last year
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- 发布 palm-kit 桌面版☆27Nov 18, 2020Updated 5 years ago
- ☆16May 6, 2015Updated 10 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 2 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- ☆17Apr 6, 2021Updated 4 years ago
- It is a simple PHP backdoor created for educational and learning purposes.☆13Mar 23, 2023Updated 2 years ago