etc5had0w / shp
Shell Please 1.0 : Reverse shell code generator.
☆35Updated 2 years ago
Alternatives and similar repositories for shp:
Users that are interested in shp are comparing it to the libraries listed below
- Python program to exploit stack-based buffer overflows.☆22Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Updated 3 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 3 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- Post exploitation helper☆38Updated last year
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆61Updated 3 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 4 years ago
- ☆150Updated last year
- ☆32Updated last year
- Don't expect much :) Just expect to learn new things!☆61Updated 4 years ago
- ☆76Updated 4 years ago
- 👹☆56Updated 3 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- ☆18Updated 4 years ago
- Nessus Parser☆55Updated 7 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆117Updated 4 years ago
- ☆28Updated 4 years ago
- Buffer Overflows☆29Updated 4 years ago
- ☆82Updated 5 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- ☆48Updated 3 years ago
- A dump of all the scripts that I make☆19Updated 3 years ago