reverse-shell-generator
vulnerable-k8s-deployment
reverse-shell-generator | vulnerable-k8s-deployment | |
---|---|---|
7 | 1 | |
2,700 | 0 | |
- | - | |
6.0 | 3.4 | |
15 days ago | 8 months ago | |
JavaScript | JavaScript | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
reverse-shell-generator
-
Take the first steps to harden your Kubernetes cluster
Open revshells.com in your browser. We want to open a reverse shell into the container. Get the public IP address from your EC2 machine and paste it into the IP address field. For port, choose 8888.
- What are use cases for a reverse shell generator?
-
Reverse Shell Generator Shortcut?
Hi, I ended up not getting this to work, but looking into it further I noticed that this is just an offline copy of a hosted sites on revshells.com So you may be able to save some steps here and just directly go to that website in the attackbox, in which the save button DOES seem to work.
- Great reverse shell maker for CTF's
- bash reverse shell not working
-
Payload Question!
revshells.com is my holy bible. if one don't work, I try the next. the base64 encoding method is also a little trick I use from time to time.
- Maybe this will help someone
vulnerable-k8s-deployment
What are some alternatives?
awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares
pwncat - Fancy reverse and bind shell handler
CaptfEncoder - Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
Permit-Phishing - The demonstration of a fake EIP2612 signature for stealing ERC20 tokens with Permit2
magpieCTF-2021 - Challenges and other resources for magpieCTF 2021.
svachal - Automate writeup for vulnerable machines.
rust-pokemon-api
tryhackme-free-rooms - a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM
CTF-Frontend - This repository contains the frontend code for IEEE-CTF.