cyberstruggle / L4sh
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
☆257Updated 3 years ago
Alternatives and similar repositories for L4sh
Users that are interested in L4sh are comparing it to the libraries listed below
Sorting:
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆433Updated last year
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆399Updated 5 months ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆345Updated 8 months ago
- A polyglot payload generator☆241Updated 2 years ago
- Generate obfuscated meterpreter shells☆229Updated 3 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- Hide your payload in DNS☆613Updated 2 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆186Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆361Updated 4 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Updated 3 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆796Updated 11 months ago
- brute-forcing su for fun and possibly profit☆91Updated 5 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆377Updated 5 months ago
- Zero Infrastructure Password Cracking☆404Updated 8 months ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆440Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆197Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆482Updated 10 months ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆547Updated 3 years ago
- automated web assets enumeration & scanning [DEPRECATED]☆289Updated 2 years ago
- A small reverse shell for Linux & Windows☆598Updated 11 months ago
- ☆206Updated 4 years ago
- Subdomain finder☆368Updated 11 months ago
- Divide full port scan results and use it for targeted Nmap runs☆319Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆300Updated last year
- ☆160Updated 3 years ago
- An script to perform kerberos bruteforcing by using impacket☆447Updated 3 years ago