jbarcia / Web-ShellsLinks
☆267Updated 10 years ago
Alternatives and similar repositories for Web-Shells
Users that are interested in Web-Shells are comparing it to the libraries listed below
Sorting:
- WhiteWinterWolf's PHP web shell☆722Updated 7 years ago
- ☆183Updated 7 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆114Updated 7 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆926Updated 3 years ago
- Simple php reverse shell implemented using binary .☆428Updated 2 years ago
- ☆220Updated 5 years ago
- ☆217Updated 5 years ago
- Extracts Key Values from .keytab files☆322Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆139Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,261Updated last month
- Username tools for penetration testing☆1,215Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆389Updated 4 years ago
- GitLab User Enumeration☆44Updated 10 months ago
- Kerberoast with ACL abuse capabilities☆579Updated 11 months ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,195Updated 3 years ago
- MS17-010☆272Updated 3 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆292Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆210Updated 5 years ago
- Create a list of possible usernames for bruteforcing☆77Updated last year
- List of Stuff I did to get through the OSCP :D☆307Updated 3 years ago
- Joomla login bruteforce☆90Updated last year
- Active Directory Wordlists☆104Updated 5 years ago
- C# implementation of harmj0y's PowerView☆38Updated 5 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆405Updated 12 years ago
- ☆163Updated 3 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆343Updated last year
- linikatz is a tool to attack AD on UNIX☆580Updated 2 years ago
- Powershell script to extract information from boot PXE☆151Updated 6 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆656Updated 5 years ago