kaotickj / The-Not-So-Simple-PHP-Command-ShellLinks
This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
☆23Updated last month
Alternatives and similar repositories for The-Not-So-Simple-PHP-Command-Shell
Users that are interested in The-Not-So-Simple-PHP-Command-Shell are comparing it to the libraries listed below
Sorting:
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆12Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆24Updated 3 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆12Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆31Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Shellcode encryption in RC4 and process injection into explorer.exe.☆37Updated 2 years ago
- Alternative Myph Loader for Havoc C2☆8Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- ☆14Updated 3 years ago
- ☆19Updated 3 years ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆29Updated 6 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- recover Firefox and more browsers logins☆48Updated 3 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Updated 3 years ago
- ☆17Updated 6 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago