trackmastersteve / shell
Python 3 Reverse Shell
☆25Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for shell
- PHP Cookie Stealing Scripts for use in XSS☆27Updated 6 years ago
- Simple Karma Attack☆66Updated 4 years ago
- Selenium based web scraper to generate passwords list☆50Updated 4 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 3 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Updated 5 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆68Updated last year
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Updated 3 years ago
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆56Updated 6 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆52Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- DirTras is an automated directory/path traversal exploitation tool.☆12Updated 5 months ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated last year
- SMBMap is a handy SMB enumeration tool☆36Updated 5 months ago
- A python library to automate time-based blind SQL injection☆49Updated 5 years ago
- A simple python reverse shell written just for fun.☆65Updated last year
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 2 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago