secjohn / ruby-shellsLinks
Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.
☆29Updated 12 years ago
Alternatives and similar repositories for ruby-shells
Users that are interested in ruby-shells are comparing it to the libraries listed below
Sorting:
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Changes for Visual Studio 2013☆117Updated 9 years ago
- Juicy Potato for x86 Windows☆120Updated 5 years ago
- Preparation for OSWE☆42Updated 5 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- Updating MS08-067 Python exploit script☆105Updated 6 years ago
- Collection of username lists for enumerating kerberos domain users☆92Updated 7 years ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- pentest tools☆41Updated 7 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆45Updated 10 years ago
- CVE-2007-2447 - Samba usermap script☆59Updated 4 years ago
- ☆81Updated 5 years ago
- Powershell crazy and sometimes diabolic scripts☆157Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- Scripts created to help with post exploitation of a Windows host☆97Updated 4 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- ☆160Updated 3 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆30Updated 5 years ago
- Cheat sheet☆38Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆122Updated 3 years ago
- This is to reorganize my notes☆10Updated 4 years ago
- Aspx reverse shell☆108Updated 5 years ago
- ☆129Updated 7 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆143Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- ☆104Updated 5 years ago
- mRemoteNG Config File Decrypt☆83Updated 2 years ago