ejedev / web2shellLinks
Automate converting webshells into reverse shells.
☆72Updated 2 weeks ago
Alternatives and similar repositories for web2shell
Users that are interested in web2shell are comparing it to the libraries listed below
Sorting:
- Easy red team phishing with Puppeteer☆133Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆154Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆150Updated last year
- PowerShell Reverse Shell☆80Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Automated exploitation of MSSQL servers at scale☆127Updated this week
- POC for DLL Proxying / Hijacking☆63Updated 8 months ago
- ☆44Updated 3 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- ☆109Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- ☆75Updated 10 months ago
- ☆47Updated 3 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Updated 7 months ago
- ☆94Updated last year
- ☆166Updated last year
- ☆39Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Everything and anything related to password spraying☆151Updated last year