reverse-shell-generator
magpieCTF-2021
reverse-shell-generator | magpieCTF-2021 | |
---|---|---|
7 | 1 | |
2,700 | 15 | |
- | - | |
6.0 | 10.0 | |
17 days ago | almost 2 years ago | |
JavaScript | HTML | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
reverse-shell-generator
-
Take the first steps to harden your Kubernetes cluster
Open revshells.com in your browser. We want to open a reverse shell into the container. Get the public IP address from your EC2 machine and paste it into the IP address field. For port, choose 8888.
- What are use cases for a reverse shell generator?
-
Reverse Shell Generator Shortcut?
Hi, I ended up not getting this to work, but looking into it further I noticed that this is just an offline copy of a hosted sites on revshells.com So you may be able to save some steps here and just directly go to that website in the attackbox, in which the save button DOES seem to work.
- Great reverse shell maker for CTF's
- bash reverse shell not working
-
Payload Question!
revshells.com is my holy bible. if one don't work, I try the next. the base64 encoding method is also a little trick I use from time to time.
- Maybe this will help someone
magpieCTF-2021
-
Problem with if statements and randomized variable
This was actually a challenge in a CtF I did: https://github.com/infosec-ucalgary/magpieCTF-2021/blob/master/challenges/web-exploitation/david-byrne-online-tailor/main.py
What are some alternatives?
awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares
CTFs - CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
CaptfEncoder - Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
writeups - Writeups for vulnerable machines.
vulnerable-k8s-deployment - Example code and configuration
svachal - Automate writeup for vulnerable machines.
Permit-Phishing - The demonstration of a fake EIP2612 signature for stealing ERC20 tokens with Permit2
CTF-Difficulty - This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
squarectf - The "code" for squarectf.com
pwncat - Fancy reverse and bind shell handler
rust-pokemon-api