Webshell for Razor Syntax (C#)
☆19May 5, 2017Updated 8 years ago
Alternatives and similar repositories for RazorSyntaxWebshell
Users that are interested in RazorSyntaxWebshell are comparing it to the libraries listed below
Sorting:
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Automatical Attacker for Weblogic☆11Mar 25, 2018Updated 7 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- ☆42May 10, 2016Updated 9 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- RFD Checker - security CLI tool to test Reflected File Download issues☆64Feb 26, 2019Updated 7 years ago
- ☆52Oct 17, 2019Updated 6 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- Exfiltrate data over screen interfaces☆58Nov 13, 2017Updated 8 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆84Mar 23, 2018Updated 7 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago