k4mpr3t / b4tm4nLinks
B4TM4N ~ PHP WEBSHELL
☆191Updated last year
Alternatives and similar repositories for b4tm4n
Users that are interested in b4tm4n are comparing it to the libraries listed below
Sorting:
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆205Updated last year
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆224Updated last year
- unix SSH post-exploitation 1337 tool☆137Updated 6 years ago
- Pip install exploit package☆157Updated 6 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆195Updated 5 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆170Updated 5 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆237Updated 4 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- Social Engineering Tool☆189Updated 7 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆204Updated 3 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆250Updated 3 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 6 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- Clear all your logs in [linux/windows] servers 🛡️☆313Updated 4 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Bruteforce HTTP Authentication☆139Updated 6 years ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆231Updated 2 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆345Updated 4 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 8 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆128Updated 6 years ago
- CVE-2018-6389 Exploit In WordPress DoS☆81Updated 7 years ago
- A simple exploit to execute system command on codiad☆65Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆125Updated 6 years ago
- WPHunter A Wordpress Vulnerability Scanner☆170Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆138Updated 7 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆264Updated 7 years ago
- A python based cross-platform tool that automates the process of detecting and exploiting error-based injection security flaws.☆139Updated 2 years ago