Cheap & Nasty Wordpress Command Execution Shell
☆92May 10, 2019Updated 6 years ago
Alternatives and similar repositories for wordpress-shell
Users that are interested in wordpress-shell are comparing it to the libraries listed below
Sorting:
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- ☆14Jan 5, 2024Updated 2 years ago
- Web-based shell written in PHP☆12Aug 27, 2018Updated 7 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- XSS平台 CTF工具 Web安全工具☆11Jun 3, 2018Updated 7 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- SMBExec C# module☆219Aug 21, 2020Updated 5 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆127Mar 13, 2021Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- ☆50Sep 25, 2017Updated 8 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Deception implementation through analysis of BloodHound data☆55Oct 9, 2025Updated 5 months ago
- ☆10Aug 21, 2024Updated last year
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- ☆10Aug 9, 2024Updated last year
- ☆28Dec 28, 2017Updated 8 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right a…☆33May 21, 2019Updated 6 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆241Mar 22, 2023Updated 3 years ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆159Jun 24, 2024Updated last year
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- Responder for Python3☆100Aug 15, 2019Updated 6 years ago