febinrev / rshellz
rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.
☆13Updated last year
Alternatives and similar repositories for rshellz:
Users that are interested in rshellz are comparing it to the libraries listed below
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Repository of tools used in my blog☆50Updated 11 months ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- ☆17Updated 5 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- ☆17Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 8 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Updated 3 years ago
- ☆13Updated 7 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- RDP EXPLOİT☆12Updated 5 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 6 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago