A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.
☆29Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for Shellkiller
Users that are interested in Shellkiller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 4 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Reverse engineering challenges☆52Nov 3, 2019Updated 6 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆30Nov 12, 2019Updated 6 years ago
- ☆13Mar 3, 2025Updated last year
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- ☆13Apr 28, 2025Updated 10 months ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- Research into creating tiny .NET executables☆14Apr 21, 2018Updated 7 years ago
- Jsfuck decryption implemented by pure Python code☆13Jul 22, 2019Updated 6 years ago
- Official challenge and writeup repository for RITSEC CTF 2018.☆16Nov 30, 2018Updated 7 years ago
- ☆25Mar 18, 2018Updated 8 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 8 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- Interact with Windows RPC Services over SMB using go-smb☆11Feb 27, 2026Updated 3 weeks ago
- ☆34Apr 18, 2020Updated 5 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- ☆18Oct 2, 2018Updated 7 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆12Jun 4, 2022Updated 3 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- WORDLE for DOS, written in assembly☆12Jan 4, 2023Updated 3 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago