operatorequals / oneliner-shView external linksLinks
oneliner is a tool that gives a list of compatible reverse-shell-string oneliners
☆24Jul 30, 2016Updated 9 years ago
Alternatives and similar repositories for oneliner-sh
Users that are interested in oneliner-sh are comparing it to the libraries listed below
Sorting:
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 5 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- A simple bash script to remove (purge) unused linux kernels☆11Mar 9, 2017Updated 8 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated last year
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- ☆10May 8, 2016Updated 9 years ago
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Finding SSL Blindspots for Red Teams☆35Jul 28, 2020Updated 5 years ago
- ☆10Oct 25, 2017Updated 8 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Jun 3, 2022Updated 3 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 9 years ago