kavishkagihan / CannonLinks
Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse shells, and many more.
☆19Updated 3 years ago
Alternatives and similar repositories for Cannon
Users that are interested in Cannon are comparing it to the libraries listed below
Sorting:
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 7 months ago
- ☆25Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 4 months ago
- A little cheatsheet for NetExec☆22Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- ☆38Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆18Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated 11 months ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆23Updated 3 years ago
- ☆47Updated 3 years ago
- ☆20Updated 3 years ago