155 skills found · Page 6 of 6
mksipe / Shell Script LibThese are some scripts that will look for certain types of information on your system. Such as vulns, exploit tools, and Hardware types. Will also create a library of shell scripts that can be useful while hardening your system.
terry81 / Malicious Web Scripts SearchHere are two perl scripts. The first one hack-search.pl searches your files for malicious code according to some well-known paths. It will find most malicious web files (exploits, backdoors, shells...) which hackers leave on websites. The second script find_and_replace.pl can be used to clean your web files from the malicious patterns. This find and replace script works recursively and on more than one line.
IlayTheVuln / WindowsOffenderI have developed a malware program using the C programming language, which includes various malicious features such as privilege escalation exploit, lsass dumper, reverse shell, keylogging, IAT hooking, DLL injection, and more. It should be noted that the program is constantly being updated, and some versions may not be fully functional.
roughiz / Davfs Exploit Rootkit RevShellNo description available
MadExploits / Alfa RceALFA SHELL RCE, EXPLOIT
tegal1337 / NekoBotV1 OldNekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell old Version
Jnnshschl / ThemeBleedReverseShellDLLReverse shell i used in combination with the ThemeBleed exploit.
nanotechz9l / Corelan Exploit Tutorial Part 1 Stack Based OverflowsAll exploits used in Corelans tutorial part 1 have been ported to Ruby & have been verified do give up a shell.
Prabesh01 / Laravel PHP Unit RCE Auto Shell UploaderLaravel-PHP-Unit-RCE (CVE-2018-15133) Auto Exploiter and Shell Uploader
Codename-R / 407MiniShell407 Authentic Exploit Mini shell backdoor
tihmstar / Dyld Print To File Exploitexploits DYLD_PRINT_TO_FILE, modifys sudoers, cleans up and spawns root shell
RootShelll / Keisatsu ShellKeisatsu Shell Backdoor is a powerful PHP web shell/backdoor for authorized web exploitation and security testing. Discover its features, usage instructions, and ethical guidelines.
ma7amd / SeLoadDriverPrivilegeSeLoadDriverPrivilege Exploit tools pre-compiled and ready for doing a reveres shell, just by modify the .bat file with you server IP and listening port.
d34th4b0v / Google Cloud Exploitation Xmr Mining With XmrigYou can exploit google's cloud, they give a free cloud instance for free use it to your profit by mining on it, they don't get you for ~3-4 days. Can earn good xmr with a few accounts, plus you can acces google cloud shell with tor so that even if they flag the IP, it doesn't matter.
azwisec / LinuxprivLinux Privilege Escalation Resourses. Aswin Govind Aswin Govind Sep 8·1 min read Linux Privilege Escalation tactics and techniques Resourses designed to help you improve your privilege escalation game. Links and Resourses: Enjoy 😃 https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md list of Unix binaries https://gtfobins.github.io/ https://book.hacktricks.xyz/linux-unix/privilege-escalation https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_-_linux.html LD_Preload https://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/ Spawn Shell https://netsec.ws/?p=337 Tools LinPEAS https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS LinEnum https://github.com/rebootuser/LinEnum Linux-Exploit-Suggester https://github.com/mzet-/linux-exploit-suggester Linux-Priv-Checker https://github.com/sleventyeleven/linuxprivchecker Exploits https://www.exploit-db.com/ Machines https://tryhackme.com/room/vulnversity https://tryhackme.com/room/cmess https://tryhackme.com/room/lazyadmin https://tryhackme.com/room/anonymous https://tryhackme.com/room/tomghost https://tryhackme.com/room/convertmyvideo Thank You.
Tr3v0r / Mass Exploit Slider Revolution ShowbizExploit para upload de shell em massa a partir da falha Slider Showbiz
pashayogi / Exploitexploit tools uploaded shell backdoor to website and scaning
ebrasha / CVE 2024 7029A PoC tool for exploiting CVE-2024-7029 in AvTech devices, enabling RCE, vulnerability scanning, and an interactive shell.
vickyaryan7 / Text4shell ExploitPython Script to exploit RCE of CVE-2022-42889
regorsec / PowerShell Post ExploitationAn assortment of PowerShell scripts that relate to Post Exploitation Objectives.