☆12Aug 29, 2025Updated 6 months ago
Alternatives and similar repositories for shells-payloads
Users that are interested in shells-payloads are comparing it to the libraries listed below
Sorting:
- z/OS (mainframe) Network Job Entry (NJE) python library and example scripts.☆28Aug 1, 2024Updated last year
- ☆30Aug 8, 2015Updated 10 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- Collection of materials related to IBM z/OS security☆45Dec 14, 2015Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- FTP server for MVS 3.8j☆12Nov 23, 2023Updated 2 years ago
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆28Nov 9, 2016Updated 9 years ago
- ☆10May 8, 2016Updated 9 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- ☆41May 3, 2024Updated last year
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- LPARDesign Tool - Helps in configuring your CPC for PR/SM and HiperDispatch☆10Jun 17, 2024Updated last year
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Oct 14, 2021Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- ☆18Oct 20, 2021Updated 4 years ago
- ☆22May 29, 2020Updated 5 years ago
- A Python version of PadBuster.pl by Gotham Digital Security (GDSSecurity on Github)☆24May 1, 2012Updated 13 years ago
- PowerShell Runspace Connect-Back Shell☆26Dec 31, 2015Updated 10 years ago
- Privilege escalation tools on Mainframe☆84Aug 24, 2019Updated 6 years ago
- Passive DNS visualization and Passive DNS server toolkit☆35Mar 22, 2012Updated 13 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- An example implementation of WOLA BATCH for z/OS Connect Enterprise Edition, including COBOL source files, sample JCLs, a matching zCEE A…☆10Sep 1, 2020Updated 5 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago