nopernik / msfvenom-bc-generator
Metasploit msfvenom Bash Completions Generator
☆42Updated 8 years ago
Alternatives and similar repositories for msfvenom-bc-generator
Users that are interested in msfvenom-bc-generator are comparing it to the libraries listed below
Sorting:
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago
- Custom THP Dropper☆26Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- ☆29Updated 7 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Automates credential skimming from service accounts in Windows Registry☆76Updated 4 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- Axis2 RPC Shell☆15Updated 9 years ago
- ☆34Updated 8 years ago
- Small modification version of p0wnedShell☆40Updated 9 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆64Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆119Updated 5 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- ☆55Updated 2 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 3 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- Updated the FoxGlove Security WebLogic serialization exploit.☆31Updated 8 years ago