A web shell for pivoting and lateral movement
☆33Nov 29, 2017Updated 8 years ago
Alternatives and similar repositories for fulcrom
Users that are interested in fulcrom are comparing it to the libraries listed below
Sorting:
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- A Python script to backup all repos (public or private) of a user.☆22Oct 2, 2023Updated 2 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- ☆22Aug 3, 2024Updated last year
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- ☆17Dec 14, 2022Updated 3 years ago
- ☆36Jul 15, 2020Updated 5 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 4 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated 11 months ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated last year
- Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustr…☆17Aug 18, 2021Updated 4 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- dcsync bof☆46Feb 13, 2026Updated last month
- Fly into Gophish with One Click (Infra Automation)☆52Mar 30, 2023Updated 2 years ago
- Dirfuzz by golang☆15Feb 28, 2023Updated 3 years ago
- Tunnel SSH and other protocols over HTTP☆29Apr 22, 2017Updated 8 years ago
- AWS doesn't care enough about BlueSky to post its releases there, but I do.☆16Feb 11, 2026Updated last month
- Rust编写的父进程PID欺骗技术测试工具☆53Jan 9, 2023Updated 3 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- ☆18Aug 1, 2022Updated 3 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆20Oct 1, 2025Updated 5 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- ☆61Jun 26, 2022Updated 3 years ago
- reverse proxy server☆19Jul 7, 2016Updated 9 years ago
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year