update
This commit is contained in:
@@ -38,6 +38,7 @@ Can be deployed on victim machines to scan the intranet.
|
||||
- pingscan.py: small python script, which can detect internal hosts via ping probes natively.
|
||||
Can be deployed on victim machines to scan the intranet.
|
||||
- [deepce.sh](https://github.com/stealthcopter/deepce): Docker Privilege Escalation (e.g. exposed socket)
|
||||
- [socat](https://github.com/3ndG4me/socat)
|
||||
|
||||
### Reverse Shell: Payloads
|
||||
- rev_shell.py: Generates a reverse shell command (e.g. netcat, python, ...)
|
||||
@@ -73,6 +74,8 @@ Can be deployed on victim machines to scan the intranet.
|
||||
- [windows-exploit-suggester.py](https://github.com/AonCyberLabs/Windows-Exploit-Suggester)
|
||||
- [aspx-reverse-shell.aspx](https://github.com/borjmz/aspx-reverse-shell)
|
||||
- [xp_cmdshell.py](https://github.com/0xalwayslucky/pentesting-tools) (thanks to @alwayslucky)
|
||||
- [PetitPotam.py](https://github.com/topotam/PetitPotam)
|
||||
- [socat.exe](https://github.com/3ndG4me/socat)
|
||||
|
||||
### Example API-Usage
|
||||
TODO: Add some example code or bash commands on how to use the custom libraries, e.g. fileserver, xss_handler, etc.
|
||||
Reference in New Issue
Block a user