ejedev / web2shellLinks
Automate converting webshells into reverse shells.
☆69Updated 2 weeks ago
Alternatives and similar repositories for web2shell
Users that are interested in web2shell are comparing it to the libraries listed below
Sorting:
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 2 months ago
- POC for DLL Proxying / Hijacking☆61Updated 3 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 7 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 6 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 11 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆52Updated 2 years ago
- ☆109Updated 9 months ago
- Automated exploitation of MSSQL servers at scale☆115Updated last week
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated 2 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆66Updated 3 weeks ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆68Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- A little cheatsheet for NetExec☆25Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- ☆70Updated 5 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year