k4mpr3t / b4tm4n
B4TM4N ~ PHP WEBSHELL
☆187Updated 8 months ago
Alternatives and similar repositories for b4tm4n:
Users that are interested in b4tm4n are comparing it to the libraries listed below
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆219Updated 9 months ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆220Updated last year
- Reverse Shell Cheat Sheet TooL☆294Updated 4 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 7 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- A python based cross-platform tool that automates the process of detecting and exploiting error-based injection security flaws.☆140Updated 2 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆237Updated 4 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆295Updated 5 years ago
- Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for…☆145Updated 4 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆274Updated 6 years ago
- Search Exploitable Software on Linux☆227Updated 2 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆277Updated 9 years ago
- Social Engineering Tool☆189Updated 6 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 9 months ago
- An Exploit framework for Web Vulnerabilities written in Python☆170Updated 4 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆341Updated 4 years ago
- unix SSH post-exploitation 1337 tool☆136Updated 6 years ago
- Fud Payload generator script☆241Updated 6 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- Bypassing WAF by abusing SSL/TLS Ciphers☆313Updated 3 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆531Updated 4 years ago
- EternalBlue Metasploit Port to various Windows Versions from Windows XP SP2 up to Windows 10 Pro☆148Updated 6 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- Simple python backdoor with Ngrok tunnel support☆203Updated last year
- Containing Self Made Perl Reproducers / PoC Codes☆193Updated 5 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.☆111Updated 2 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- WebShell Dump☆172Updated 8 years ago