Upgrade your netcat shell today!
☆58Jul 11, 2017Updated 8 years ago
Alternatives and similar repositories for NetcatUP
Users that are interested in NetcatUP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jan 27, 2018Updated 8 years ago
- File Decrypter for the PS4 version 4.05☆16Jan 5, 2018Updated 8 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- ☆16Jan 15, 2018Updated 8 years ago
- ☆40Jan 14, 2018Updated 8 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- 4.05 kernel dumping POC with patches☆13Jun 5, 2018Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- FTP server for PS4 with root access, UART, full debug settings - credits: WildCard, Specter, IDC, Shadow, Xerpi, xVortex, BISOON, xemio☆22Apr 1, 2018Updated 7 years ago
- 4.55 kernel dumping POC with patches☆15Mar 20, 2018Updated 8 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆13Jan 16, 2018Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago