Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation reverse shell
exploitation
x
reverse-shell
x
18 search results found
Byob
⭐
8,681
An open-source post-exploitation framework for students, researchers and developers.
Androrat
⭐
2,423
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Reverse Shell
⭐
1,600
Reverse Shell as a Service
Eggshell
⭐
1,589
iOS/macOS/Linux Remote Administration Tool
Jexboss
⭐
1,470
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Redis Rogue Server
⭐
852
Redis(<=5.0.5) RCE
Gobyvuls
⭐
650
Vulnerabilities of Goby supported with exploitation.
Liffy
⭐
591
Local file inclusion exploitation tool
Gtfo
⭐
416
Search gtfobins and lolbas files from your terminal
Hershell
⭐
355
Multiplatform reverse shell generator
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Hackembedded
⭐
161
This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices
Beemka
⭐
136
Basic Electron Exploitation
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Drozer Modules
⭐
121
Cve 2018 11776 Python Poc
⭐
115
Working Python test and PoC for CVE-2018-11776, includes Docker lab
Php Backdoors
⭐
101
PHP shell backdoors list ( collection )
Seashell
⭐
94
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Keres
⭐
82
Persistent Powershell backdoor tool
Rsgen
⭐
73
rsGen is a Reverse Shell Payload Generator for hacking.
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Pyfud
⭐
36
CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)
Buffer Overflow
⭐
32
Powercat V2.0
⭐
30
Evade the boys in blue and acquire a reverse shell using powercat v2.0
Yaps
⭐
29
Yet Another PHP Shell - The most complete PHP reverse shell
Web Exploitation Engine
⭐
27
Generic Command Exploitation Engine for exploiting web application command-injection bugs,.
Maintp
⭐
24
Mainframe Transfer: PROTOCOL
Readhook
⭐
24
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Fudrat
⭐
22
Generate Undetectable Metasploit Payload in a simple way
Offensive Tor Toolkit
⭐
20
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
Cve 2018 3191 Rce Exploit
⭐
18
Mwr Android
⭐
18
A collection of utilities for Android applications.
No1seandrorat Android Remote Administration Tool Rat
⭐
14
no1seAndroRAT is a remote access tool that utilizes msfvenom and apktool, all in one script for your convenience.
Atmail Exploit Toolchain
⭐
11
AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)
Jar Agent
⭐
8
Multi Client Reverse Shell
⭐
8
A multi-client reverse shell that allows multiple connections from target computers || Hedef bilgisayarlardan gelen birden fazla bağlantıya izin veren çoklu istemcili reverse shell.
Megaploit
⭐
8
A hacking tool(Reverse shell) based on python-3
Suidsploit
⭐
8
A Tool which can exploit 137 files from GTFO-Bins automaticlly
Oscp
⭐
7
oscp历程
Urchin
⭐
7
🐚💥 Python socket remote shell that lets you connect to others computers through the shell when they run the client.
Openemr Rce
⭐
6
OpenEMR <= 5.0.1 - (Authenticated) Remote Code Execution
Windowsmeterpretersessiondied
⭐
6
Some exploits are unstable in nature and only allow for a very short shell command window. These scripts can help extend your remote shell session by quickly spawning a new reverse shell.
Snikshell
⭐
5
Powershell reverse shell, written in python3.9
Docker Imagetragick
⭐
5
Crestcrack
⭐
5
Exploits CVE-2016-5640 / CLVA-2016-05-002 against Crestron AM-100
Rogue Agent
⭐
5
Related Searches
Python Exploitation (1,625)
Exploitation Cve (742)
Vulnerabilities Exploitation (599)
C Exploitation (545)
Exploitation Penetration Testing (353)
1-18 of 18 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.