kaotickj / The-Not-So-Simple-PHP-Command-ShellLinks
This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
β22Updated this week
Alternatives and similar repositories for The-Not-So-Simple-PHP-Command-Shell
Users that are interested in The-Not-So-Simple-PHP-Command-Shell are comparing it to the libraries listed below
Sorting:
- π Python Exploit for CVE-2022-23935β13Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps β¦β24Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year
- Analyze Windows Systems for common and unique vulnerabilitiesβ10Updated 3 years ago
- Recon-ng modules for basic OSINT.β11Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β22Updated 4 years ago
- A collection of Vulnerable Windows Driversβ15Updated 3 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.β40Updated 3 years ago
- β14Updated 3 years ago
- Very Easy Relative Backdoor Applicationβ12Updated 4 years ago
- Simple C2 over the Trello APIβ39Updated 2 years ago
- Unpacking tool for the zipExec Crypterβ14Updated 3 years ago
- PoC for the CVE-2021-20837 : RCE in MovableTypeβ18Updated 3 years ago
- π Help find Trojan Source vulnerability in code π . Useful for code review in project with multiple collaborators (CI/CD)β47Updated last year
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)β16Updated 2 years ago
- x86_64 LKM linux rootkitβ16Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.β17Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082β27Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness relatedβ¦β18Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ66Updated 3 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoftβ23Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macroβ¦β25Updated 3 years ago
- β12Updated 5 months ago
- Polymorphic code obfuscator for use in Red Team operationsβ30Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements frameworkβ94Updated 4 years ago
- Basic Dart reverse shell codeβ21Updated last year
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- Red Team C2 and Post Exploitation codeβ36Updated 2 months ago