A web shell for pivoting and lateral movement
☆33Nov 29, 2017Updated 8 years ago
Alternatives and similar repositories for fulcrom
Users that are interested in fulcrom are comparing it to the libraries listed below
Sorting:
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- ☆22Aug 3, 2024Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Dirfuzz by golang☆15Feb 28, 2023Updated 3 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- ☆17Mar 6, 2023Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- ☆17Jan 2, 2026Updated 2 months ago
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 5 months ago
- AWS doesn't care enough about BlueSky to post its releases there, but I do.☆16Feb 11, 2026Updated 2 weeks ago
- ☆17Dec 14, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- A Python script to backup all repos (public or private) of a user.☆21Oct 2, 2023Updated 2 years ago
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- ☆19Jul 9, 2022Updated 3 years ago
- ☆36Jul 15, 2020Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustr…☆17Aug 18, 2021Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Apr 18, 2023Updated 2 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Rust编写的父进程PID欺骗技术测试工具☆53Jan 9, 2023Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆235Oct 18, 2022Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- Tunnel SSH and other protocols over HTTP☆29Apr 22, 2017Updated 8 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- reverse proxy server☆19Jul 7, 2016Updated 9 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago