Metasploit msfvenom Bash Completions Generator
☆43Jul 17, 2016Updated 9 years ago
Alternatives and similar repositories for msfvenom-bc-generator
Users that are interested in msfvenom-bc-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆83Mar 15, 2017Updated 9 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 2 months ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 9 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- eternalrelayx☆36Jul 10, 2019Updated 6 years ago
- ☆12Nov 24, 2016Updated 9 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14May 13, 2018Updated 7 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Feb 24, 2020Updated 6 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Golang AES Reader Writer Struct☆17Jan 30, 2018Updated 8 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 9 years ago
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- a pass-the-hash tool☆104Mar 1, 2018Updated 8 years ago