GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
May 29, 2024 - HTML
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land (LOTL) persistent Reverse shell
Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.
MgToLs mas de 80 herramientas de hacking para la gran mayoria de ataques.
Open a reverse shell in a web page using HTTP
an undetected (by windows defender, AMSI, and malwarebytes) powershell reverse shell based off of hoaxshell - with firewall bypass
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Pentest framework with in browser UI
CS Tool is a complete cybersecurity website guide with all cyber security-related information such as different cyber threats and how to prevent these threats. Also, we provide cyber security testing/hacking tools including a Keylogger, Text encryption-decryption, Mac Address changer, Reverse Shell Attack, Image Steganography and Risk Calculator.
Vulnerable Flask E-Commerce Cyber Security Group 120
CTF writeups, basically
Writeup ViII Jornadas Nacionales de Investigación (JNIC 2023). Equipo: Sergio Pérez Peló, Raúl Martín Santamaría e Isaac Lozano Osorio.
Basic python scripts and reverse shell programs
Answers, tips and tricks for different CTFs
a lightweight, multiplayer, http reverse shell C2, with autorun stages - supports ncat, hoaxshell, and encrypted reverse shells
Add a description, image, and links to the reverse-shell topic page so that developers can more easily learn about it.
To associate your repository with the reverse-shell topic, visit your repo's landing page and select "manage topics."