kaotickj / The-Not-So-Simple-PHP-Command-ShellLinks
This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
☆21Updated last year
Alternatives and similar repositories for The-Not-So-Simple-PHP-Command-Shell
Users that are interested in The-Not-So-Simple-PHP-Command-Shell are comparing it to the libraries listed below
Sorting:
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- ☆12Updated 4 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆27Updated 2 years ago
- Basic Dart reverse shell code☆21Updated last year
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- ☆19Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆23Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Updated 7 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago
- ☆17Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Updated 4 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆41Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆30Updated 4 years ago
- Right-To-Left Override POC☆35Updated 3 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year