mazen160 / shenninaLinks
Automating Host Exploitation with AI
☆544Updated 2 years ago
Alternatives and similar repositories for shennina
Users that are interested in shennina are comparing it to the libraries listed below
Sorting:
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,522Updated last year
- Black Hat Asia 2023 PDF Public☆576Updated 2 years ago
- Multiplatform Python WebShell☆317Updated last year
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆704Updated this week
- https://cve.mitre.org/☆163Updated last month
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Updated 3 weeks ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆860Updated this week
- ☆2,019Updated last week
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- An XSS Exploitation Tool☆317Updated 3 months ago
- Linux/Windows post-exploitation framework made by linux user☆1,627Updated last month
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆412Updated 3 years ago
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆354Updated 2 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆434Updated 2 years ago
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆379Updated 3 years ago
- EPSS & VEDAS Score Aggregator for CVEs☆252Updated last week
- The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.☆310Updated 2 months ago
- ☆692Updated this week
- Script for generating revshells☆474Updated last year
- Totally Insecure Web Application Project (TIWAP)☆174Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,397Updated 8 months ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆598Updated 5 months ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆535Updated 9 months ago
- mip22 is a advanced phishing tool☆637Updated last year
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆625Updated 6 months ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆249Updated 10 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆512Updated this week
- Proof of Concept (PoC) CVE-2021-4034☆98Updated 3 years ago
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆281Updated 3 years ago
- a lightweight, flexible and novel open source poc verification framework☆237Updated 3 years ago