lukechilds / reverse-shell
Reverse Shell as a Service
☆1,892Updated last year
Alternatives and similar repositories for reverse-shell
Users that are interested in reverse-shell are comparing it to the libraries listed below
Sorting:
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,861Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,813Updated 3 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,932Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,910Updated 2 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,303Updated 4 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,400Updated 7 months ago
- A tool to dump the login password from the current linux user☆3,945Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,201Updated last week
- Automatic SSRF fuzzer and exploitation tool☆3,188Updated 2 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,536Updated 7 months ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,072Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,243Updated this week
- A modern multiple reverse shell sessions manager written in go☆1,584Updated 2 weeks ago
- A Tool for Domain Flyovers☆5,759Updated 2 years ago
- Find web directories without bruteforce☆1,831Updated last year
- HTTP parameter discovery suite.☆5,623Updated 2 months ago
- 🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.☆1,512Updated 4 months ago
- LKM Linux rootkit☆2,716Updated 4 years ago
- ✍️ A curated list of CVE PoCs.☆3,398Updated 3 years ago
- Monitor linux processes without root permissions☆5,421Updated 2 years ago
- Pwn stuff.☆1,772Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆3,940Updated last year
- Proof of concept for CVE-2019-0708☆1,184Updated 3 years ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,455Updated 3 weeks ago
- Mass scan IPs for vulnerable services☆1,031Updated 3 years ago
- Notes about attacking Jenkins servers☆2,055Updated 10 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,504Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,158Updated 3 months ago
- Pop shells like a master.☆1,461Updated 6 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,460Updated 5 years ago