A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.
☆29Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for Shellkiller
Users that are interested in Shellkiller are comparing it to the libraries listed below
Sorting:
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Official challenge and writeup repository for RITSEC CTF 2018.☆16Nov 30, 2018Updated 7 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- Reverse engineering challenges☆52Nov 3, 2019Updated 6 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆30Nov 12, 2019Updated 6 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Apr 24, 2019Updated 6 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Apr 4, 2016Updated 9 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Decrement Windows Kernel for fun and profit☆39Jan 29, 2018Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- vm escape exploit☆39Sep 24, 2017Updated 8 years ago
- CTF write-ups☆100Sep 12, 2025Updated 5 months ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Feb 15, 2019Updated 7 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago