wetw0rk / malicious-wordpress-plugin
Simply generates a wordpress plugin that will grant you a reverse shell once uploaded. I recommend installing Kali Linux, as msfvenom is used to generate the payload.
☆286Updated last year
Alternatives and similar repositories for malicious-wordpress-plugin:
Users that are interested in malicious-wordpress-plugin are comparing it to the libraries listed below
- Simple php reverse shell implemented using binary .☆405Updated last year
- ☆198Updated 10 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆370Updated 3 months ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 10 months ago
- MS17-010☆270Updated 2 years ago
- Collection of things made during my OSCP journey☆257Updated 7 years ago
- Herramienta para evadir disable_functions y open_basedir☆409Updated last year
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆115Updated 2 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆850Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆477Updated 4 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆274Updated last year
- A unique automated LFi Exploiter with Bind/Reverse Shells☆274Updated 9 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆572Updated 8 months ago
- davtest (improved)- Exploits WebDAV folders☆108Updated 2 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆531Updated 2 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆221Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆759Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Changes for Visual Studio 2013☆116Updated 9 years ago
- Tricks for penetration testing☆573Updated 4 years ago
- An script to perform kerberos bruteforcing by using impacket☆444Updated 2 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 5 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆424Updated 11 months ago
- ☆149Updated 2 years ago
- A Powershell Privilege Escalation Enumeration Script.☆308Updated 7 years ago
- Active Directory ACL exploitation with BloodHound☆716Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆514Updated 2 years ago
- socks4 reverse proxy for penetration testing☆587Updated 6 years ago
- ☆137Updated 7 years ago