kaotickj / The-Not-So-Simple-PHP-Command-Shell
This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
☆21Updated last year
Alternatives and similar repositories for The-Not-So-Simple-PHP-Command-Shell:
Users that are interested in The-Not-So-Simple-PHP-Command-Shell are comparing it to the libraries listed below
- Yet another powerful payload encoder/decoder☆14Updated 2 years ago
- roadmap for being a self-taught hacker☆9Updated 11 months ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- legacy Botnets source code Forked from github.com/malwares☆21Updated 3 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated last year
- ☆11Updated 11 months ago
- the assembly shell and backdoor Trojan☆17Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆21Updated 3 years ago
- Some good things for EXP-301 course☆11Updated last year
- Remote Code Execution EJS Web Applications using express-fileupload☆13Updated 3 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆16Updated 2 months ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Updated 2 years ago
- Shellcode encryption in RC4 and process injection into explorer.exe.☆37Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆14Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 2 weeks ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Right-To-Left Override POC☆34Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Remote Template Injection Toolkit☆30Updated 9 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- simple shellcode injector for Windows / Process Hollowing☆11Updated 7 months ago