☆40May 29, 2015Updated 10 years ago
Alternatives and similar repositories for perl-reverse-shell
Users that are interested in perl-reverse-shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- ☆17May 29, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Tool to help identify timing attacks☆70Sep 4, 2011Updated 14 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆207Nov 6, 2023Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆158Apr 20, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/yaptest☆67Feb 25, 2022Updated 4 years ago
- Python-based tool to dump security information from Windows systems☆284Jun 22, 2020Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49May 29, 2015Updated 10 years ago
- ☆2,793Aug 7, 2024Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,082Feb 7, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 9 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,498Aug 1, 2023Updated 2 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆23Oct 28, 2019Updated 6 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 9 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10☆21Apr 16, 2020Updated 6 years ago
- cewl wordlist generator from https://digi.ninja/projects/cewl.php☆29Jul 3, 2015Updated 10 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆31Dec 17, 2018Updated 7 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- ☆76Jun 5, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- Writeups For Exploit Education Challenges☆10Jun 21, 2021Updated 4 years ago
- PoC code from blog☆17Mar 10, 2020Updated 6 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 8 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago