slemire / reversetrollLinks
Reverse Shell troll software
☆12Updated 6 years ago
Alternatives and similar repositories for reversetroll
Users that are interested in reversetroll are comparing it to the libraries listed below
Sorting:
- A mirror of several precompiled standalone red-teaming tools.☆19Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Updated 4 years ago
- DNS hijacking via dead records automation tool☆53Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- ☆17Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Updated 10 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- ☆30Updated 2 years ago
- Presentaciones de congresos☆55Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- ☆30Updated 5 years ago