Aspx reverse shell
☆120Feb 4, 2020Updated 6 years ago
Alternatives and similar repositories for aspx-reverse-shell
Users that are interested in aspx-reverse-shell are comparing it to the libraries listed below
Sorting:
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- ☆13Jan 3, 2021Updated 5 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,188Jan 20, 2023Updated 3 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,341Jul 12, 2024Updated last year
- Proof of Concept for CVE-2019-18634☆235Sep 12, 2021Updated 4 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94May 20, 2021Updated 4 years ago
- Collection of ctf write-up source codes.☆16Jun 28, 2021Updated 4 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆129Aug 20, 2018Updated 7 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆426Jul 29, 2013Updated 12 years ago
- A proof of concept for CVE-2023–1326 in apport-cli 2.26.0☆21Dec 6, 2023Updated 2 years ago
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated last month
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆23Jan 13, 2022Updated 4 years ago
- SSTI Payload Generator☆92Aug 8, 2022Updated 3 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,187Sep 10, 2020Updated 5 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Collection of username lists for enumerating kerberos domain users☆108Dec 18, 2017Updated 8 years ago
- Monitor linux processes without root permissions☆5,891Jan 17, 2023Updated 3 years ago
- Demo of a malicious python package that will run code upon pip download or install☆29Sep 10, 2022Updated 3 years ago
- A repository of tools for pentesting of restricted and isolated environments.☆585Oct 26, 2021Updated 4 years ago
- Jackson Rce For CVE-2019-12384☆102Jul 24, 2019Updated 6 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 9 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆159Jun 24, 2024Updated last year
- Static binaries, removing any required dependencies from the operating system. Gziped files availabe to download via curl onto your targ…☆82Oct 27, 2022Updated 3 years ago
- splunksecrets is a tool for working with Splunk secrets offline☆80Jun 5, 2025Updated 8 months ago
- Exploits for some windows binaries :)☆51Feb 18, 2026Updated last week
- Exploit for CVE-2021-3129☆68Mar 7, 2021Updated 4 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,260Feb 20, 2026Updated last week
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆882Jan 3, 2025Updated last year