apurvsinghgautam / HTTP-Reverse-Shell
An HTTP Reverse Shell in Python
☆70Updated last year
Alternatives and similar repositories for HTTP-Reverse-Shell:
Users that are interested in HTTP-Reverse-Shell are comparing it to the libraries listed below
- Password list generator for password spraying - prebaked with goodies☆101Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Powershell crazy and sometimes diabolic scripts☆153Updated 4 years ago
- ☆189Updated 5 years ago
- ☆133Updated 9 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆221Updated 3 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Changes for Visual Studio 2013☆116Updated 9 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- ☆104Updated 5 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- Windows reverse shell GUI☆95Updated 3 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆169Updated 3 years ago
- A shot code to Bypass UAC in Windows.☆26Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆86Updated 7 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆215Updated last year
- Some of the best web shells that you might need☆45Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆44Updated 9 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆141Updated last month
- PowerShell payload generator☆115Updated 3 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Updated 3 years ago
- ☆29Updated 2 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆118Updated 4 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆259Updated last year
- Protocol agnostic online password guessing API.☆80Updated last year
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆215Updated 4 years ago
- ☆149Updated last year
- OSCP Cheatsheets☆94Updated 5 years ago
- Password spraying tool and Bloodhound integration☆221Updated last month