nopernik / msfvenom-bc-generatorView external linksLinks
Metasploit msfvenom Bash Completions Generator
☆43Jul 17, 2016Updated 9 years ago
Alternatives and similar repositories for msfvenom-bc-generator
Users that are interested in msfvenom-bc-generator are comparing it to the libraries listed below
Sorting:
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆83Mar 15, 2017Updated 8 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Feb 24, 2020Updated 5 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- ☆14May 13, 2018Updated 7 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- eternalrelayx☆36Jul 10, 2019Updated 6 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Tunnel SSH and other protocols over HTTP☆29Apr 22, 2017Updated 8 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago