octetsplicer / LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
☆140Updated 2 years ago
Alternatives and similar repositories for LAZYPARIAH:
Users that are interested in LAZYPARIAH are comparing it to the libraries listed below
- Text4Shell scanner for Burp Suite☆189Updated 2 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆257Updated last year
- D3Ext's Forward Shell☆120Updated last year
- Yet another content discovery tool☆119Updated 5 months ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆112Updated last year
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆158Updated 4 years ago
- RCE exploit for dompdf☆175Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆155Updated last year
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆430Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆318Updated 9 months ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆353Updated 2 years ago
- ☆406Updated 2 years ago
- ☆518Updated 3 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆223Updated 2 months ago
- grim reaper c2☆337Updated 2 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆365Updated 5 months ago
- ☆293Updated 9 months ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆161Updated last year
- Go shellcode loader that combines multiple evasion techniques☆364Updated last year
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆133Updated last month
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆434Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆451Updated last year
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆260Updated 2 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆265Updated 2 years ago
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆123Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Updated 3 years ago