The long shadow to emerge as other Git repositories
☆18Feb 25, 2026Updated 2 months ago
Alternatives and similar repositories for Shadow
Users that are interested in Shadow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- ☆12Sep 22, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Apr 8, 2026Updated 3 weeks ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Apr 23, 2026Updated last week
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆39Mar 3, 2023Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆15Dec 27, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 4 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 11 months ago
- Perform OSINT on external targets using Shodan☆24Feb 7, 2024Updated 2 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 3 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆104Mar 17, 2023Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- Base16 for Shells☆19Jun 30, 2022Updated 3 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- 一个支持自定义搜索引擎的 Chrome 划词小窗搜索扩展☆11Feb 10, 2019Updated 7 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- PEDA - Python Exploit Development Assistance for GDB☆24Aug 6, 2025Updated 8 months ago
- This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it☆18Feb 2, 2023Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- delosNmap | Nmap Script☆39Jan 15, 2023Updated 3 years ago