Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.
☆29Feb 6, 2013Updated 13 years ago
Alternatives and similar repositories for ruby-shells
Users that are interested in ruby-shells are comparing it to the libraries listed below
Sorting:
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only s…☆12Aug 2, 2013Updated 12 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- This program will connect to Google's API using an access token and inject a calendar event into a target's calendar.☆18Oct 9, 2019Updated 6 years ago
- Invisible Watermarks with Space Characters in ASCII Files☆21Jun 14, 2018Updated 7 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- ☆49Oct 28, 2020Updated 5 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Sep 30, 2022Updated 3 years ago
- This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)☆26Mar 10, 2020Updated 6 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 5 months ago
- Grab target's webcam shots by link☆20Oct 26, 2019Updated 6 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- File-based locks for Python on Linux and Windows☆26Feb 3, 2023Updated 3 years ago
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- A simple demo getting JMX metrics from a docker container☆12Feb 3, 2016Updated 10 years ago
- Our repo for crushing through RTO course & labs.☆37Sep 12, 2022Updated 3 years ago
- Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133☆10Mar 15, 2019Updated 7 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- Personal notes used to pass the OSWP exam☆94Aug 10, 2022Updated 3 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- PHP文件上传漏洞☆11Jun 11, 2018Updated 7 years ago