febinrev / rshellz
rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.
☆13Updated last year
Alternatives and similar repositories for rshellz:
Users that are interested in rshellz are comparing it to the libraries listed below
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 months ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- RDP EXPLOİT☆12Updated 5 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 10 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 8 months ago
- ☆13Updated 7 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago