A python approach to interacting with web shells.
☆30Jan 16, 2021Updated 5 years ago
Alternatives and similar repositories for RCE_Web_Shell_Python
Users that are interested in RCE_Web_Shell_Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Dec 1, 2021Updated 4 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Becoming the spider, crawling through the webs to catch the fly.☆84Jun 25, 2021Updated 4 years ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 6 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Jan 16, 2021Updated 5 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- ☆17Jan 2, 2020Updated 6 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Mar 18, 2026Updated 3 weeks ago
- A Payload Injector for bugbounties written in go☆70Jul 18, 2020Updated 5 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆89Jan 16, 2021Updated 5 years ago
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆15Feb 8, 2024Updated 2 years ago
- Fully Undetectable telegram Rat dropper☆35Nov 16, 2020Updated 5 years ago
- Important notes for oswe exam prepration. Challenges faces during oswe exam prepration.☆17Jan 14, 2020Updated 6 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆127Aug 13, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated last month
- ORDER - A small Python web-app to practice blind SQLi in order by☆21Mar 21, 2021Updated 5 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 4 years ago
- The tools I have programmed to help me with bugbounty's☆117Oct 10, 2019Updated 6 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆152Nov 19, 2021Updated 4 years ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- vulnerable windows binaries for exploitation practice☆45Jun 6, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Steam, Dota, CSGO, PUBG Scam Site☆11Jan 23, 2022Updated 4 years ago
- Based On Android API☆13Mar 7, 2023Updated 3 years ago
- Universal Java Based API for android for downloading media for various social media platforms like instagram, facebook,pinterest, tublr e…☆12Nov 23, 2018Updated 7 years ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago