Automate converting webshells into reverse shells.
☆72Updated this week
Alternatives and similar repositories for web2shell
Users that are interested in web2shell are comparing it to the libraries listed below
Sorting:
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21May 1, 2023Updated 2 years ago
- ☆29Oct 17, 2018Updated 7 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Weaponized HellsGate/SigFlip☆203Jun 7, 2023Updated 2 years ago
- ☆120Mar 28, 2025Updated 11 months ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.☆24Oct 31, 2022Updated 3 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- ☆38Jan 13, 2023Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ☆14Oct 29, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Just some random Red Team Scripts that can be useful☆153Jun 28, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Mar 6, 2025Updated 11 months ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆21Feb 10, 2026Updated 2 weeks ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆49Jul 14, 2020Updated 5 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 2 weeks ago
- Native Syscalls Shellcode Injector☆266Jul 2, 2023Updated 2 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆285Mar 5, 2025Updated 11 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆330Jul 15, 2024Updated last year
- This is a CLI tool to check a csv of email addresses and user names in https://haveibeenpwned.com☆13Jul 13, 2018Updated 7 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago