cyberstruggle / L4sh
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
☆256Updated 3 years ago
Alternatives and similar repositories for L4sh:
Users that are interested in L4sh are comparing it to the libraries listed below
- Generate obfuscated meterpreter shells☆228Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 3 years ago
- Hide your payload in DNS☆613Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆343Updated 8 months ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆383Updated 4 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆481Updated 10 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆434Updated last year
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆356Updated 4 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Updated 3 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated 7 months ago
- A small reverse shell for Linux & Windows☆599Updated 10 months ago
- An script to perform kerberos bruteforcing by using impacket☆446Updated 3 years ago
- A polyglot payload generator☆241Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆530Updated 2 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆399Updated 4 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆197Updated 3 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆594Updated 3 years ago
- A unique technique to execute binaries from a password protected zip☆1,026Updated 2 years ago
- ☆275Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- ☆165Updated 4 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆376Updated 5 months ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆440Updated last year
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆198Updated 2 years ago
- ☆118Updated 2 years ago
- ☆158Updated 3 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆177Updated 2 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆920Updated 3 years ago