cyberstruggle / L4shLinks
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
☆257Updated 3 years ago
Alternatives and similar repositories for L4sh
Users that are interested in L4sh are comparing it to the libraries listed below
Sorting:
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆442Updated last year
- Hide your payload in DNS☆616Updated 2 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 3 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆398Updated 9 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Divide full port scan results and use it for targeted Nmap runs☆326Updated last year
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆602Updated 3 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆193Updated 3 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆395Updated 7 months ago
- Subdomain finder☆369Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆195Updated 3 years ago
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆382Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆356Updated last year
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆453Updated 2 months ago
- A unique technique to execute binaries from a password protected zip☆1,033Updated 3 years ago
- ☆165Updated 5 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆384Updated 4 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Zero Infrastructure Password Cracking☆409Updated last year
- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM syste…☆280Updated 3 years ago
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆360Updated 3 years ago
- A small reverse shell for Linux & Windows☆612Updated last year
- SonicWall SSL-VPN Exploit☆185Updated 4 years ago
- A polyglot payload generator☆244Updated 3 years ago
- ☆206Updated 4 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆199Updated 3 years ago