wetw0rk / malicious-wordpress-plugin
Simply generates a wordpress plugin that will grant you a reverse shell once uploaded. I recommend installing Kali Linux, as msfvenom is used to generate the payload.
☆286Updated last year
Alternatives and similar repositories for malicious-wordpress-plugin:
Users that are interested in malicious-wordpress-plugin are comparing it to the libraries listed below
- Simple php reverse shell implemented using binary .☆405Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 10 months ago
- Collection of things made during my OSCP journey☆257Updated 7 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆531Updated 2 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆274Updated 9 years ago
- MS17-010☆270Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆572Updated 8 months ago
- ☆198Updated 10 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆477Updated 4 years ago
- A Powershell Privilege Escalation Enumeration Script.☆308Updated 7 years ago
- ☆137Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- Drupal enumeration & exploitation tool☆596Updated 4 years ago
- Herramienta para evadir disable_functions y open_basedir☆407Updated last year
- ☆214Updated 4 years ago
- Automatic Service Enumeration Script☆224Updated 2 years ago
- davtest (improved)- Exploits WebDAV folders☆108Updated 2 years ago
- Some of the best web shells that you might need☆45Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆115Updated 2 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 5 years ago
- A library of pretexts to use on offensive phishing engagements.☆341Updated 5 years ago
- ☆158Updated 3 years ago
- Collection of different exploits☆182Updated 4 years ago
- Cheap & Nasty Wordpress Command Execution Shell☆86Updated 5 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆506Updated 6 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆221Updated 5 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆274Updated last year
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆850Updated 2 years ago
- OSCP cheet sheet☆196Updated 4 years ago