A Simple C Reverse Shell
β22Jan 9, 2019Updated 7 years ago
Alternatives and similar repositories for C-Reverse-Shell
Users that are interested in C-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- π Reverse Shell Cheat Sheet πβ13Mar 11, 2019Updated 7 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and manaβ¦β12Mar 29, 2020Updated 5 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).β13Jul 19, 2019Updated 6 years ago
- A collection of penetration testing tools written in Python 2β14Sep 16, 2019Updated 6 years ago
- An evolving how-to guide for securing a Linux server.β15Apr 12, 2019Updated 6 years ago
- WikiLeaks Vault 7 CIA Hacking Toolsβ15Sep 9, 2017Updated 8 years ago
- A list of resources for those interested in getting started in bug bountiesβ15Jan 15, 2019Updated 7 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.β19Feb 15, 2020Updated 6 years ago
- List of Awesome Red Teaming Resourcesβ116Jan 2, 2019Updated 7 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.β10Oct 20, 2018Updated 7 years ago
- A TCP Client and Server Python3β19Jul 10, 2024Updated last year
- A list of web application securityβ79Oct 8, 2018Updated 7 years ago
- β10May 10, 2023Updated 2 years ago
- c programmingβ10Oct 31, 2020Updated 5 years ago
- A collection of python scripts that are used for network analysis and testing.β59Oct 4, 2019Updated 6 years ago
- Bug-Bounty Resources and Articlesβ13Sep 16, 2018Updated 7 years ago
- A collection of resources, guides and automation scripts used to secure the Docker platformβ33May 5, 2024Updated last year
- Python YouTube Video Downloaderβ16May 25, 2020Updated 5 years ago
- β28Feb 11, 2016Updated 10 years ago
- Go bindings for Carinaβ’β13Feb 6, 2017Updated 9 years ago
- Algorithms of facial recognition through sketchesβ13May 9, 2014Updated 11 years ago
- β12May 4, 2021Updated 4 years ago
- Creating executables from ELF-coredumpsβ10Dec 7, 2015Updated 10 years ago
- β13Jul 16, 2021Updated 4 years ago
- Homebrew tap for nostrβ10Jan 2, 2026Updated 2 months ago
- Fuzzing with the generated argument and environment variableβ10Jul 14, 2022Updated 3 years ago
- Bash scripting tutorialβ24Dec 1, 2018Updated 7 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)β46Jun 10, 2016Updated 9 years ago
- Tools to work with the Anki Vector robotβ11Nov 21, 2020Updated 5 years ago
- β14Feb 1, 2020Updated 6 years ago
- Malicious use of macho, such as dump-runtime-macho, function-hook.β15Mar 20, 2017Updated 9 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.β24Jul 19, 2019Updated 6 years ago
- RFCat scripts to dump HCS keeloq encoder dataβ13Sep 25, 2016Updated 9 years ago
- AIMSICD β’ Fight IMSI-Catcher, StingRay and silent SMS!β15Jan 11, 2020Updated 6 years ago
- Nostr Relay in Elixir with Mnesiaβ12Mar 10, 2025Updated last year
- Compression Identifier tool (Zlib, Deflate, Gzip)β26Oct 26, 2025Updated 4 months ago
- Information and build status for SubgraphOS Debian packagesβ19Nov 23, 2017Updated 8 years ago
- Turns virtual usbredir connections into physical onesβ14Jun 17, 2020Updated 5 years ago
- β20Sep 19, 2021Updated 4 years ago