chrispetrou / shellbackLinks
Reverse shell generator
☆24Updated 6 years ago
Alternatives and similar repositories for shellback
Users that are interested in shellback are comparing it to the libraries listed below
Sorting:
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- miscellaneous stuff☆21Updated 10 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- A web application for generating custom XSS payloads☆77Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- A collection of Nmap NSE scripts that I made.☆30Updated 12 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- ☆13Updated 8 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- ☆22Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- NmapPy - Python implementation of Nmap☆35Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45Updated 6 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 8 years ago