mthbernardes / rsgLinks
ReverShellGenerator - A tool to generate various ways to do a reverse shell
☆567Updated last year
Alternatives and similar repositories for rsg
Users that are interested in rsg are comparing it to the libraries listed below
Sorting:
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated last year
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆481Updated 5 years ago
- Simple php reverse shell implemented using binary .☆433Updated 2 years ago
- Python PTY backdoors - full PTY or nothing!☆750Updated 11 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 7 years ago
- Post Exploitation Wiki☆526Updated 6 years ago
- Collection of things made during my OSCP journey☆268Updated 8 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆703Updated 5 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆982Updated 8 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 3 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆604Updated 10 years ago
- socks4 reverse proxy for penetration testing☆632Updated 7 years ago
- Tricks for penetration testing☆581Updated 5 years ago
- ☆509Updated 7 years ago
- Good For OSCP Training☆440Updated 7 years ago
- OSCP cheet sheet☆199Updated 5 years ago
- Notes of my OSCP study plan☆465Updated 3 years ago
- Default usernames and passwords for various systems (VoIP,IPMI,Oracle).☆439Updated last year
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆578Updated 3 years ago
- Smart Install Exploitation Tool☆592Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,068Updated 5 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆553Updated 5 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891Updated 5 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆543Updated 4 months ago
- ☆199Updated 6 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,503Updated 2 years ago
- A Powershell Privilege Escalation Enumeration Script.☆315Updated 7 years ago
- Network reconnaissance and vulnerability assessment tools.☆400Updated 4 years ago
- An archive of everything related to OSCP☆625Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,005Updated 7 years ago