Basic script to generate reverse shell payloads, generally most used in ctf.
☆27Mar 20, 2024Updated last year
Alternatives and similar repositories for Rev-Shell
Users that are interested in Rev-Shell are comparing it to the libraries listed below
Sorting:
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- ☆47May 31, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- AI Powered Terminal Based Ethical Hacking Assistant☆88Feb 3, 2025Updated last year
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- CTF Writeup including upsolve / Hack The Box Writeup☆21Jul 29, 2025Updated 7 months ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- ☆64Mar 14, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Aug 19, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆45Aug 12, 2025Updated 6 months ago
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Exploits for some linux binaries :)☆36Nov 2, 2025Updated 3 months ago
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆85Feb 22, 2025Updated last year
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- ☆11Updated this week
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆25Jan 23, 2024Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Jan 13, 2024Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago