rek7 / postshellLinks
PostShell - Post Exploitation Bind/Backconnect Shell
☆83Updated 6 years ago
Alternatives and similar repositories for postshell
Users that are interested in postshell are comparing it to the libraries listed below
Sorting:
- ☆49Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Updated 3 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- A simple python reverse shell written just for fun.☆62Updated 3 years ago
- HashCobra Hash Cracking tool.☆122Updated 5 years ago
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Tool to brute website sub-domains and dirs.☆49Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 6 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Updated 4 years ago
- Using IPv6 to Bypass Security☆92Updated 5 months ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Hiding implants in HTML files☆66Updated 5 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- ☆34Updated 5 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- Ex-pv8's☆64Updated 6 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Updated 8 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Methods of C2☆22Updated 10 years ago