pentestmonkey / php-reverse-shell
β2,317Updated 5 months ago
Alternatives and similar repositories for php-reverse-shell:
Users that are interested in php-reverse-shell are comparing it to the libraries listed below
- Linux enumeration tool for pentesting and CTFs with verbosity levelsβ3,490Updated last year
- π― Command Injection Payload Listβ3,081Updated 6 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,140Updated last year
- A script that you can run in the background!β2,777Updated 5 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hostsβ1,206Updated 3 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,260Updated 7 months ago
- Monitor linux processes without root permissionsβ5,059Updated 2 years ago
- The ultimate WinRM shell for hacking/pentestingβ4,656Updated last month
- Windows / Linux Local Privilege Escalation Workshopβ1,909Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Scriptβ1,599Updated 2 years ago
- Red Teaming & Pentesting checklists for various engagementsβ2,522Updated 4 months ago
- Fancy reverse and bind shell handlerβ2,674Updated 5 months ago
- Writeups for HacktheBox 'boot2root' machinesβ1,919Updated last year
- Linux privilege escalation auditing toolβ5,739Updated 11 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,147Updated 2 months ago
- β1,120Updated this week
- A tool to perform Kerberos pre-auth bruteforcingβ2,747Updated 4 months ago
- CeWL is a Custom Word List Generatorβ2,054Updated 2 months ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!β1,685Updated 10 months ago
- β1,072Updated 3 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies andβ¦β3,711Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β16,618Updated this week
- JAWS - Just Another Windows (Enum) Scriptβ1,723Updated 3 years ago
- Red Teaming Tactics and Techniquesβ4,116Updated 4 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,271Updated 2 weeks ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β4,343Updated this week
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam reportβ3,616Updated last month
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on thβ¦β4,005Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,123Updated 2 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,215Updated this week