Search the Community

Showing results for tags 'shell'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 121 results

  1. This project is a simple collection of various shellcode injection techniques, aiming to streamline the process of endpoint detection evaluation, besides challenging myself to get into the Golang world. [hide][Hidden Content]]
  2. Features Connection is encrypted using random RSA + AES key Multiple clients support Execute shell commands Download/Upload files Take screenshot Cross platform [hide][Hidden Content]]
  3. HTTP-revshell - Powershell Reverse Shell Using HTTP/S Protocol With AMSI Bypass And Proxy Aware HTTP-revshell is a tool focused on redteam exercises and pentesters. This tool provides a reverse connection through the http/s protocol. It use a covert channel to gain control over the victim machine through web requests and thus evade solutions such as IDS, IPS and AV. Features SSL Proxy Aware Upload Function Download Function Error Control AMSI bypass Multiple sessions [only server-multisession.py] Autocomplete PowerShell functions (optional) [only server.py] [hide][Hidden Content]]
  4. Can someone help me with tolls to auto upload shell to sites and small guidance on how to do it properly. I also need a tool for ssh cracking/brute force
  5. ShellGen (Shell Generator) This is a simple script that will generate a specific or all shellcodes for CTFs using the VPN IP address on tun0 (the IPv4). INFORMATION Update has been made from sys library to argparse library (done in version 0.8) [hide][Hidden Content]]
  6. USE THIS TOOL ONLY FOR EDUCATIONAL PURPOSE.DONT USE FOR ILLEGAL PURPOSE . THIS TOOL CAN BYPASS MAJORITY OF ANTIVIRUS EVEN WINDOWS DEFENDER CHANGE IP AND PORT IN SHELL GAIN AND LISTENER.PY FILE.PLEASE DONT UPLOAD IN VIRUSTOTAL [HIDE][Hidden Content]]
  7. JSshell - A JavaScript Reverse Shell For Exploiting XSS Remotely Or Finding Blind XSS, Working With Both Unix And Windows OS JSshell - a JavaScript reverse shell. This using for exploit XSS remotely, help to find blind XSS, ... This tool works for both Unix and Windows operating system and it can running with both Python 2 and Python 3. This is a big update of JShell - a tool to get a JavaScript shell with XSS by s0med3v. JSshell also doesn't require Netcat (different from other javascript shells). [HIDE][Hidden Content]]
  8. itsMe

    Jex Bot V5 | Auto Shell Bot

    JEX V5 [PRO] ~All Exploits Re-Coded and added New Firewall bypass methods for GET 100% Results [HIDE] Download: [Hidden Content]]
  9. A modern multiple reverse shell sessions/clients manager via terminal written in go Features Multiple service listening port Multiple client connections RESTful API Reverse shell as a service (Pop a reverse shell without remembering idle commands) Download/Upload file with progress bar Full interactive shell Using vim gracefully in reverse shell Using CTRL+C and CTRL+Z in reverse shell [HIDE][Hidden Content]]
  10. About: Read Folder and File in server and can you edit file or change chmod of file or dir [HIDE][Hidden Content]]
  11. Read the license before using any part from this code Reverse Shell in Shortcut File (.lnk) How it works? Shortcut file (Microsoft Windows 9.x) LNK is a file extension for a shortcut file used by Microsoft Windows to point to an executable file. LNK stands for LiNK. Shortcut files are used as a direct link to an executable file, instead of having to navigate to the executable. LNK files contain some basic properties, such as the path to the executable file and the “Start-In” directory. LNK files use a curled arrow to indicate they are shortcuts, and the file extension is hidden (even after disabling “Hide Extensions for Known File Types” in Windows Explorer). The script creates a .lnk file that points to the user's "cmd.exe" file (located in the default folder C:\Windows\System32\cmd.exe) to run a reverse shell through arguments. Features: Reverse TCP Port Forwarding using Ngrok.io [HIDE][Hidden Content]]
  12. JATAYU Stealthy Stand-Alone PHP Web Shell FEATURES Http Header Based Authentication. 100% Undetectable. Exec Function Changer. Nothing Fancy [HIDE][Hidden Content]]
  13. Vulnx v2.0 - An Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS (Wordpress , Joomla , Drupal , Prestashop ...) Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the target like subdomains, ipaddresses, country, org, timezone, region, ans and more ... Instead of injecting each and every shell manually like all the other tools do, VulnX analyses the target website checking the presence of a vulnerabilitie if so the shell will be Injected.searching urls with dorks Tool. Features Detects cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia) Target informations gatherings Target Subdomains gathering Multi-threading on demand Checks for vulnerabilities Auto shell injector Exploit dork searcher Ports Scan High Level Dns-Servers Dump Input multiple target to scan. Dorks Listing by Name& by ExploitName. Export multiple target from Dorks into a logfile. Joomla Com Jce Com Jwallpapers Com Jdownloads Com Jdownloads2 Com Weblinks Com Fabrik Com Fabrik2 Com Jdownloads Index Com Foxcontact Com Blog Com Users Com Ads Manager Com Sexycontactform Com Media Mod_simplefileupload Com Facileforms Com Facileforms Com extplorer Wordpress Simple Ads Manager InBoundio Marketing WPshop eCommerce Synoptic Showbiz Pro Job Manager Formcraft PowerZoom Download Manager CherryFramework Catpro Blaze SlideShow Wysija-Newsletters Drupal Add Admin Drupal BruteForcer Drupal Geddon2 PrestaShop attributewizardpro columnadverts soopamobile pk_flexmenu pk_vertflexmenu nvn_export_orders megamenu tdpsthemeoptionpanel psmodthemeoptionpanel masseditproduct blocktestimonial soopabanners Vtermslideshow simpleslideshow productpageadverts homepageadvertise homepageadvertise2 jro_homepageadvertise advancedslider cartabandonmentpro cartabandonmentproOld videostab wg24themeadministration fieldvmegamenu wdoptionpanel Opencart Opencart BruteForce [HIDE][Hidden Content]]
  14. Golang reverse/bind shell generator This tool generates a Go binary that launches a shell of the desired type on the targeted host. The shell binary can be compiled for multiple platforms, supports partial polymorphism (unique functions’ names) and can use UDP protocol instead of the default TCP. If you send a DELETE command over the established connection, the shell binary removes itself from the host it was executed on. [HIDE][Hidden Content]]
  15. Multi-thread Twitter BruteForcer in Shell Script Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter, this script can bypass login limiting and it can test infinite number of passwords with a rate of +400 passwords/min using 20 threads. Legal disclaimer: Usage of TweetShell for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program Features Multi-thread (400 pass/min, 20 threads) Save/Resume sessions Anonymous attack through TOR Default password list (best +39k 8 letters) Check valid username Check and Install all dependencies [HIDE][Hidden Content]]
  16. itsMe

    [PHP] Priv8 Shell

    Tools Password login protection php 7.x supported Adminer Configs grabber + configs 404 + symlink config Cgi telnet with new design Back connect Mass deface Bypass disabled functions Wordpress mass title Changer Wordpress mass user Changer Cpanel grabber Jumping More useful features... [HIDE][Hidden Content]]
  17. NekoBot is an auto exploit tool to facilitate the penetration of one or many websites (Wordpress, Joomla, Drupal, Magento, Opencart,and Etc). Features : [+] Wordpress : 1- Cherry-Plugin 2- download-manager Plugin 3- wysija-newsletters 4- Slider Revolution [Revslider] 5- gravity-forms 6- userpro 7- wp-gdpr-compliance 8- wp-graphql 9- formcraft 10- Headway 11- Pagelines Plugin 12- WooCommerce-ProductAddons 13- CateGory-page-icons 14- addblockblocker 15- barclaycart 16- Wp 4.7 Core Exploit 17- eshop-magic 18- HD-WebPlayer 19- WP Job Manager 20- wp-miniaudioplayer 21- wp-support-plus 22- ungallery Plugin 23- WP User Frontend 24- Viral-options 25- Social Warfare 26- jekyll-exporter 27- cloudflare plugin 28- realia plugin 29- woocommerce-software 30- enfold-child Theme 31- contabileads plugin 32- prh-api plugin 33- dzs-videogallery plugin 34- mm-plugin 35- Wp-Install 36- Auto BruteForce [+] Joomla 1- Com_adsmanager 2- Com_alberghi 3- Com_CCkJseblod 4- Com_extplorer 5- Com_Fabric 6- Com_facileforms 7- Com_Hdflvplayer 8- Com_Jbcatalog 9- Com_JCE 10- Com_jdownloads 11- Com_Joomanager 12- Com_Macgallery 13- Com_media 14- Com_Myblog 15- Com_rokdownloads 16- Com_s5_media_player 17- Com_SexyContactform 18- Joomla core 3.x RCE 19- Joomla core 3.x RCE [2019] 20 - Joomla Core 3.x Admin Takeover 21 - Auto BruteForce 22 - Com_b2jcontact 23 - Com_bt_portfolio 24 - Com_civicrm 25 - Com_extplorer 26 - Com_facileforms 27 - Com_FoxContent 28 - Com_jwallpapers 29 - Com_oziogallery 30 - Com_redmystic 31 - Com_simplephotogallery 32 - megamenu module 33 - mod_simplefileuploadv1 [+] Drupal : 1- Drupal Add admin geddon1 2- Drupal RCE geddon2 3- Drupal 8 RCE RESTful 4- Drupal mailchimp 5- Drupal php-curl-class 6- BruteForce 7- Drupal SQL Add Admin 8- Drupal 7 RCE 9- bartik 10- Avatarafd Config 11- Drupal 8 12- Drupal Default UserPass [+] Magento : 1- Shoplift 2- Magento Default user pass [+] Oscommerce 1- OsCommerce Core 2.3 RCE Exploit opencart [+] OTHER : 1- Env Exploit 2- SMTP CRACKER 3- CV [HIDE][Hidden Content]]
  18. dEEpEst

    Weevely - Weaponized web shell

    Weevely is a web shell designed for post-exploitation purposes that can be extended over the network at runtime. Upload weevely PHP agent to a target web server to get remote shell access to it. It has more than 30 modules to assist administrative tasks, maintain access, provide situational awareness, elevate privileges, and spread into the target network. Download: [Hidden Content] Tutorial: Backdoor A Web Server Using Weevely
  19. _____ _______ _____ _____ _____ _ _ _ _ | __ \ |__ __/ ____| __ \ / ____| | | | | | | | |__) |_____ _____ _ __ ___ ___| | | | | |__) | | (___ | |__| | ___| | | | _ // _ \ \ / / _ \ '__/ __|/ _ \ | | | | ___/ \___ \| __ |/ _ \ | | | | \ \ __/\ V / __/ | \__ \ __/ | | |____| | ____) | | | | __/ | | |_| \_\___| \_/ \___|_| |___/\___|_| \_____|_| |_____/|_| |_|\___|_|_| - By: @ZHacker13 - | Modules | - Show C2-Server Modules. - | Info | - Show Remote-Host Info. - | Upload | - Upload File from Local-Host to Remote-Host. - | Download | - Download File from Remote-Host to Local-Host. - | Screenshot | - Save Screenshot from Remote-Host to Local-Host. Tutorial: [Hidden Content] Download: [HIDE][Hidden Content]]
  20. Scripteen Image Upload script suffers from a shell upload vulnerability. View the full article
  21. Restaurant Management System version 1.0 suffers from a remote shell upload vulnerability. View the full article
  22. 1337day-Exploits

    Chamilo LMS 1.11.8 Shell Upload

    Chamilo LMS version 1.11.8 suffers from a remote shell upload vulnerability. View the full article
  23. FileThingie version 2.5.7 suffers from a remote shell upload vulnerability. View the full article
  24. [Hidden Content]
  25. 1337day-Exploits

    Baldr Botnet Panel Shell Upload

    This Metasploit module exploits the file upload vulnerability of baldr malware panel in order to achieve arbitrary code execution. View the full article