PostShell - Post Exploitation Bind/Backconnect Shell
☆83Sep 9, 2019Updated 6 years ago
Alternatives and similar repositories for postshell
Users that are interested in postshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆27Aug 16, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 4 years ago
- fireELF - Fileless Linux Malware Framework☆682Apr 17, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated 802.1x Bypass☆89Mar 11, 2020Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Sep 9, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 7 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 10 months ago
- ☆18Aug 1, 2022Updated 3 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- ☆26Apr 5, 2020Updated 6 years ago
- A simple TCP socket utility that gives you a TTY☆29May 22, 2020Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Apr 14, 2021Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆22Jul 30, 2024Updated last year
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 7 months ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆38Nov 1, 2019Updated 6 years ago
- AutoStart teamserver and listeners with services☆74Dec 23, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- ☆106May 28, 2021Updated 4 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago