GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
Oct 28, 2024 - HTML
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land (LOTL) persistent Reverse shell
Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and self-configuring backdoors. With its Web interface and powerful Console Client, it is the best combination for your RedTeam/APT campaigns.
Open a reverse shell in a web page using HTTP
Pentest framework with in browser UI
an undetected (by windows defender, AMSI, and malwarebytes) powershell reverse shell based off of hoaxshell - with firewall bypass
Curated list of Unix binaries that can be exploited to bypass system security restrictions
CS Tool is a complete cybersecurity website guide with all cyber security-related information such as different cyber threats and how to prevent these threats. Also, we provide cyber security testing/hacking tools including a Keylogger, Text encryption-decryption, Mac Address changer, Reverse Shell Attack, Image Steganography and Risk Calculator.
Vulnerable Flask E-Commerce Cyber Security Group 120
CTF writeups, basically
Basic python scripts and reverse shell programs
Answers, tips and tricks for different CTFs
Writeup ViII Jornadas Nacionales de Investigación (JNIC 2023). Equipo: Sergio Pérez Peló, Raúl Martín Santamaría e Isaac Lozano Osorio.
Add a description, image, and links to the reverse-shell topic page so that developers can more easily learn about it.
To associate your repository with the reverse-shell topic, visit your repo's landing page and select "manage topics."