cybervaca / ShellReverseLinks
Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....
☆25Updated 7 years ago
Alternatives and similar repositories for ShellReverse
Users that are interested in ShellReverse are comparing it to the libraries listed below
Sorting:
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆99Updated last year
- ☆19Updated 4 years ago
- Dehashed API CLI☆21Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- ☆30Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆32Updated 3 years ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆82Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- brute force SSH public-key authentication☆77Updated 4 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- ☆24Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year