chrispetrou / shellbackLinks
Reverse shell generator
☆23Updated 6 years ago
Alternatives and similar repositories for shellback
Users that are interested in shellback are comparing it to the libraries listed below
Sorting:
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Updated 2 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- ☆13Updated 8 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- A web application for generating custom XSS payloads☆77Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A collection of scripts used to interact with the Burp Rest API☆55Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- ☆23Updated 9 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- NmapPy - Python implementation of Nmap☆35Updated 7 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Updated 2 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Updated 4 years ago