GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
Jun 18, 2024 - HTML
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land (LOTL) persistent Reverse shell
Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.
Open a reverse shell in a web page using HTTP
an undetected (by windows defender, AMSI, and malwarebytes) powershell reverse shell based off of hoaxshell - with firewall bypass
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Pentest framework with in browser UI
CS Tool is a complete cybersecurity website guide with all cyber security-related information such as different cyber threats and how to prevent these threats. Also, we provide cyber security testing/hacking tools including a Keylogger, Text encryption-decryption, Mac Address changer, Reverse Shell Attack, Image Steganography and Risk Calculator.
Vulnerable Flask E-Commerce Cyber Security Group 120
CTF writeups, basically
a lightweight, multiplayer, http reverse shell C2, with autorun stages - supports ncat, hoaxshell, and encrypted reverse shells
Basic python scripts and reverse shell programs
Answers, tips and tricks for different CTFs
Writeup ViII Jornadas Nacionales de Investigación (JNIC 2023). Equipo: Sergio Pérez Peló, Raúl Martín Santamaría e Isaac Lozano Osorio.
Add a description, image, and links to the reverse-shell topic page so that developers can more easily learn about it.
To associate your repository with the reverse-shell topic, visit your repo's landing page and select "manage topics."