PowerShell Runspace Connect-Back Shell
☆26Dec 31, 2015Updated 10 years ago
Alternatives and similar repositories for p0wnedReverse
Users that are interested in p0wnedReverse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆47Jun 10, 2016Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago
- ☆65May 26, 2016Updated 9 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- ☆78May 24, 2018Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Create Basic SSH Honeypot With Python☆29Jul 11, 2016Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- A walkthrough of deploying and configuring a PowerShell Private Gallery to Azure via ARM Templates, DSC Configurations, and Visual Studio…☆12Mar 8, 2017Updated 9 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- ☆12Aug 29, 2025Updated 7 months ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 5 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Basic python script for detect airdroid users in lan☆49Sep 30, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- PowerShell module to interact with Windows Presentation Foundation (or WPF) controls.☆30Apr 10, 2024Updated last year
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆69Feb 20, 2016Updated 10 years ago