A simple python reverse shell written just for fun.
☆62Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for TinkererShell
Users that are interested in TinkererShell are comparing it to the libraries listed below
Sorting:
- ☆25May 9, 2021Updated 4 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Code snippets from my blog☆29Oct 13, 2025Updated 4 months ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆291Jan 5, 2026Updated last month
- A Golang implant that uses Slack as a command and control server☆461Feb 25, 2023Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Feb 17, 2026Updated last week
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- ☆106May 28, 2021Updated 4 years ago
- POC which exploits a vulnerability within Nagios XI (5.6.5) to spawn a root shell☆13Jul 17, 2021Updated 4 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- wordpress hash cracker .☆66Sep 7, 2021Updated 4 years ago
- 🐚 404 Page Not Found Webshell☆87Jul 25, 2022Updated 3 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Jan 31, 2020Updated 6 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago