Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!
☆66Feb 3, 2021Updated 5 years ago
Alternatives and similar repositories for genshell
Users that are interested in genshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 22, 2022Updated 3 years ago
- ☆412Dec 14, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆183Aug 27, 2021Updated 4 years ago
- File Crawler index files and search hard-coded credentials☆36Feb 8, 2025Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- Just an AV slayer. Nothing special ;)☆215Nov 15, 2022Updated 3 years ago
- A web front-end for password cracking and analytics☆387Feb 17, 2026Updated last month
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- ☆17Apr 5, 2021Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Library for tokenizing code with TextMate grammars☆14Mar 17, 2026Updated last week
- The purpose of this repo is to share my research☆14Apr 7, 2025Updated 11 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Text4Shell scanner for Burp Suite☆189Oct 27, 2022Updated 3 years ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated last year
- ☆12Jul 15, 2022Updated 3 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- ☆1,674Apr 14, 2025Updated 11 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Aug 18, 2025Updated 7 months ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆351Oct 22, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆18Jan 9, 2025Updated last year