rek7 / postshell
PostShell - Post Exploitation Bind/Backconnect Shell
☆84Updated 5 years ago
Alternatives and similar repositories for postshell:
Users that are interested in postshell are comparing it to the libraries listed below
- ☆42Updated 7 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆118Updated 10 months ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- KeyLogger for Linux Systems☆69Updated 3 years ago
- ☆39Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- ☆93Updated 6 years ago
- A Simple PE File Heuristics Scanners☆49Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- ☆31Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- with metasploit☆63Updated 5 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 2 months ago
- Transferring Backdoor Payloads with BMP Image Pixels☆80Updated last year
- Deploy payloads to *Nix systems en masse☆108Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- ☆50Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- An Insider Threat Toolkit☆150Updated 6 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆74Updated 6 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- ☆42Updated 5 years ago
- PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE☆250Updated 5 years ago