Aspx reverse shell
☆120Feb 4, 2020Updated 6 years ago
Alternatives and similar repositories for aspx-reverse-shell
Users that are interested in aspx-reverse-shell are comparing it to the libraries listed below
Sorting:
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- ☆13Jan 3, 2021Updated 5 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,197Jan 20, 2023Updated 3 years ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Generate a reverse shell macro for Word documents.☆39May 28, 2022Updated 3 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆364Feb 12, 2024Updated 2 years ago
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 2 months ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94May 20, 2021Updated 4 years ago
- A proof of concept for CVE-2023–1326 in apport-cli 2.26.0☆21Dec 6, 2023Updated 2 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆229Aug 3, 2023Updated 2 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆23Jan 13, 2022Updated 4 years ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 3 weeks ago
- Jackson Rce For CVE-2019-12384☆102Jul 24, 2019Updated 6 years ago
- SSTI Payload Generator☆93Aug 8, 2022Updated 3 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆437Jul 29, 2013Updated 12 years ago
- A centralized list of the various Potato Windows exploits.☆21Dec 30, 2024Updated last year
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,204Sep 10, 2020Updated 5 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 10 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Static binaries, removing any required dependencies from the operating system. Gziped files availabe to download via curl onto your targ…☆82Oct 27, 2022Updated 3 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆887Jan 3, 2025Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆159Jun 24, 2024Updated last year
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- XSS payloads to bypass various XSS filters☆13May 1, 2019Updated 6 years ago
- A repository of tools for pentesting of restricted and isolated environments.☆587Oct 26, 2021Updated 4 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆865Feb 14, 2026Updated last month
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,362Sep 22, 2025Updated 6 months ago
- Collection of username lists for enumerating kerberos domain users☆107Dec 18, 2017Updated 8 years ago
- Username tools for penetration testing☆1,341Sep 20, 2024Updated last year
- Compiled Binaries for Ghostpack☆1,616Oct 24, 2024Updated last year
- A Python based ingestor for BloodHound☆2,359Oct 24, 2025Updated 4 months ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago