☆40May 29, 2015Updated 10 years ago
Alternatives and similar repositories for perl-reverse-shell
Users that are interested in perl-reverse-shell are comparing it to the libraries listed below
Sorting:
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- ☆17May 29, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Tool to help identify timing attacks☆70Sep 4, 2011Updated 14 years ago
- Automatically exported from code.google.com/p/yaptest☆66Feb 25, 2022Updated 4 years ago
- Python-based tool to dump security information from Windows systems☆281Jun 22, 2020Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49May 29, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,084Feb 7, 2021Updated 5 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,504Aug 1, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- OpenSSH 6.7p1 backdoor kit☆21Oct 23, 2014Updated 11 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆22Oct 28, 2019Updated 6 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10☆20Apr 16, 2020Updated 5 years ago
- cewl wordlist generator from https://digi.ninja/projects/cewl.php☆29Jul 3, 2015Updated 10 years ago
- Proof of Concept code of the Shoplift code☆41Oct 4, 2021Updated 4 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- ☆76Jun 5, 2018Updated 7 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- https://www.nu11secur1ty.com☆22Feb 15, 2026Updated last month
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago