k4mpr3t / b4tm4n
B4TM4N ~ PHP WEBSHELL
☆187Updated 7 months ago
Alternatives and similar repositories for b4tm4n:
Users that are interested in b4tm4n are comparing it to the libraries listed below
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆236Updated 4 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆219Updated 8 months ago
- Reverse Shell Cheat Sheet TooL☆293Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆203Updated last year
- Search Exploitable Software on Linux☆226Updated last year
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 7 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆170Updated 4 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆276Updated 2 years ago
- Clear all your logs in [linux/windows] servers 🛡️☆311Updated 3 years ago
- EternalBlue Metasploit Port to various Windows Versions from Windows XP SP2 up to Windows 10 Pro☆148Updated 6 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆201Updated 3 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆261Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆136Updated 6 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆282Updated 4 years ago
- 🐚 404 Page Not Found Webshell☆84Updated 2 years ago
- CVE-2018-6389 Exploit In WordPress DoS☆80Updated 7 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆339Updated 3 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆274Updated 9 years ago
- Social Engineering Tool☆189Updated 6 years ago
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆169Updated 5 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- Web application backdoor builder☆72Updated 3 years ago
- Porting for Metasploit of the infamous Esteemaudit RDP Exploit☆110Updated 7 years ago