iteong / reverse-shell
Reverse Shell with Python 3
☆27Updated 4 years ago
Alternatives and similar repositories for reverse-shell:
Users that are interested in reverse-shell are comparing it to the libraries listed below
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Updated 7 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 6 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆28Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- Search bing with python☆12Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- python tools to assist in penetration testing☆14Updated 2 months ago
- MS17-010☆12Updated 7 years ago