ferreiraklet / icmp_reverse_shellLinks
☆44Updated 3 years ago
Alternatives and similar repositories for icmp_reverse_shell
Users that are interested in icmp_reverse_shell are comparing it to the libraries listed below
Sorting:
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- ☆47Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- ☆47Updated 2 months ago
- ☆27Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- ☆39Updated 4 years ago
- ☆91Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆59Updated 11 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆128Updated last month
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- ☆59Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆27Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 6 months ago
- Fortinet FortiClient EMS SQL Injection☆52Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Automate converting webshells into reverse shells.☆71Updated last month