CalfCrusher / PoianaLinks
Meterpreter Reverse shell over TOR network using hidden services
☆88Updated 4 years ago
Alternatives and similar repositories for Poiana
Users that are interested in Poiana are comparing it to the libraries listed below
Sorting:
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated last year
- A powerful and delightful PHP WebShell☆67Updated 9 months ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆164Updated 4 years ago
- Just some things that have some cool uses☆114Updated 2 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Linux Persistence Toolkit☆72Updated 3 years ago
- A WLAN red team framework.☆154Updated last year
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆64Updated 4 years ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- ☆35Updated 2 years ago
- Fork from @rsmudge/armitage☆139Updated 3 years ago
- ☆108Updated last year
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆39Updated 3 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- Interactive navi redteam cheats☆33Updated 4 months ago
- ☆48Updated 4 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 3 years ago
- Extract credentials and other useful info from network captures☆75Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago