PowerShell Runspace Connect-Back Shell
☆26Dec 31, 2015Updated 10 years ago
Alternatives and similar repositories for p0wnedReverse
Users that are interested in p0wnedReverse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆47Jun 10, 2016Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆40May 13, 2016Updated 9 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago
- ☆65May 26, 2016Updated 9 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- ☆78May 24, 2018Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Create Basic SSH Honeypot With Python☆29Jul 11, 2016Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 9 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A walkthrough of deploying and configuring a PowerShell Private Gallery to Azure via ARM Templates, DSC Configurations, and Visual Studio…☆12Mar 8, 2017Updated 9 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Android Phone FireWall , it could help you to filter the boring Message and unknow Call.☆13May 22, 2013Updated 12 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- ☆12Aug 29, 2025Updated 8 months ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 12 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 5 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Basic python script for detect airdroid users in lan☆49Sep 30, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- Detect passive activity in the Tor-network☆13May 11, 2015Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- PowerShell module to interact with Windows Presentation Foundation (or WPF) controls.☆30Apr 10, 2024Updated 2 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago