oneliner is a tool that gives a list of compatible reverse-shell-string oneliners
☆24Jul 30, 2016Updated 9 years ago
Alternatives and similar repositories for oneliner-sh
Users that are interested in oneliner-sh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- A simple bash script to remove (purge) unused linux kernels☆11Mar 9, 2017Updated 9 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Data exfiltration PoC scripts☆24Sep 11, 2015Updated 10 years ago
- ☆10Oct 25, 2017Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10May 8, 2016Updated 9 years ago
- ☆52Apr 14, 2015Updated 11 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- Anti-Anti-Automation Framework☆100Aug 18, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- A collection of weaponized LPE exploits written in Go☆53Jan 23, 2025Updated last year
- Subdomain finder☆15Jul 16, 2024Updated last year
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago