Automate converting webshells into reverse shells.
☆72Mar 9, 2026Updated last week
Alternatives and similar repositories for web2shell
Users that are interested in web2shell are comparing it to the libraries listed below
Sorting:
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- ☆120Mar 28, 2025Updated 11 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆204Jun 7, 2023Updated 2 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆20Feb 10, 2026Updated last month
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 2 years ago
- ☆106May 15, 2023Updated 2 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated last month
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- Just some random Red Team Scripts that can be useful☆153Jun 28, 2024Updated last year
- RCE on Apache Solr 8.3.1☆42May 6, 2023Updated 2 years ago
- PoC Exploit for CVE-2023-35803 Unauthenticated Buffer Overflow in Aerohive HiveOS/Extreme Networks IQ Engine☆23Jul 12, 2023Updated 2 years ago
- ☆38Jan 13, 2023Updated 3 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆212Jan 2, 2023Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆741May 19, 2023Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Winsocket for Cobalt Strike.☆104Jul 6, 2023Updated 2 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆331Jul 15, 2024Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆141Sep 4, 2023Updated 2 years ago
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab…☆140Jun 2, 2023Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Native Syscalls Shellcode Injector☆267Jul 2, 2023Updated 2 years ago