Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!
☆66Feb 3, 2021Updated 5 years ago
Alternatives and similar repositories for genshell
Users that are interested in genshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 22, 2022Updated 3 years ago
- ☆412Dec 14, 2023Updated 2 years ago
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- For pentesters who don't wanna leave their terminals.☆183Aug 27, 2021Updated 4 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Just an AV slayer. Nothing special ;)☆216Nov 15, 2022Updated 3 years ago
- A web front-end for password cracking and analytics☆392Feb 17, 2026Updated 2 months ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Run Powershell without software restrictions.☆282Sep 8, 2021Updated 4 years ago
- Default Detections for EDR☆97Feb 20, 2024Updated 2 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Apr 5, 2021Updated 5 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Feb 15, 2024Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The purpose of this repo is to share my research☆14Apr 7, 2025Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆222Jun 4, 2024Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- ☆1,683Apr 14, 2025Updated last year
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆166Aug 18, 2025Updated 8 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆358Oct 22, 2024Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆18Jan 9, 2025Updated last year
- SMBeagle - Fileshare auditing tool.☆745Nov 4, 2025Updated 6 months ago