ejedev / web2shellLinks
Automate converting webshells into reverse shells.
☆70Updated this week
Alternatives and similar repositories for web2shell
Users that are interested in web2shell are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 8 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 4 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 8 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Automated exploitation of MSSQL servers at scale☆118Updated 3 weeks ago
- ☆71Updated 6 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆161Updated last year
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Just some random Red Team Scripts that can be useful☆152Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆52Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆69Updated last week
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 10 months ago
- My Favorite Offensive Security Scripts☆73Updated 5 months ago