kaotickj / The-Not-So-Simple-PHP-Command-ShellLinks
This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
☆21Updated last year
Alternatives and similar repositories for The-Not-So-Simple-PHP-Command-Shell
Users that are interested in The-Not-So-Simple-PHP-Command-Shell are comparing it to the libraries listed below
Sorting:
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- roadmap for being a self-taught hacker☆7Updated last year
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Shellcode encryption in RC4 and process injection into explorer.exe.☆37Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- Some good things for EXP-301 course☆12Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆17Updated last week
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆23Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- Right-To-Left Override POC☆34Updated 3 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- web based c2 🏴☠️☆13Updated 11 months ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆17Updated 7 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- various python scripts☆15Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- Remote Template Injection Toolkit☆42Updated last year
- ☆18Updated 7 months ago
- This is working POC of CVE-2022-36271☆9Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- ☆12Updated 3 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago