Penetration-Testing-Helper-Scripts
Chimera
Penetration-Testing-Helper-Scripts | Chimera | |
---|---|---|
1 | 3 | |
3 | 1,313 | |
- | - | |
10.0 | 0.0 | |
over 1 year ago | over 2 years ago | |
Shell | PowerShell | |
The Unlicense | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Penetration-Testing-Helper-Scripts
-
which is your reverse shell generator of choice?
For the OSCP exam I used some of the bash scripts from this repository. The one for reverse shells would automatically fetch the vpn IP address and add it to the reverse shell commands, which saved time during the exam
Chimera
What are some alternatives?
log4j-scan-turbo - Multithreaded log4j vulnerability scanner using only bash! Tests all JNDI protocols, HTTP GET/POST, and 84 headers.
ThreatCheck - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
revshellgen - Simple script to generate commands to achieve reverse shells.
BetterXencrypt - A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
Reverse_Shell_Generator - Bash script to generate reverse shell payloads
lscript - The LAZY script will make your life easier, and of course faster.
shells - Script for generating revshells
ConPtyShell - ConPtyShell - Fully Interactive Reverse Shell for Windows
Sudomy - Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
pixload - Image Payload Creating/Injecting tools
pwncat - pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
DefenderCheck - Identifies the bytes that Microsoft Defender flags on.