What the name says....
☆112Sep 15, 2024Updated last year
Alternatives and similar repositories for CAPTCHA-and-Reverse-Shell
Users that are interested in CAPTCHA-and-Reverse-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 10 months ago
- Phishing with a fake reCAPTCHA☆652Sep 13, 2024Updated last year
- A tool to check TCP connections.☆15Jun 20, 2025Updated 11 months ago
- CTF and Bug Bounty Hunting WriteUps.☆20Feb 20, 2026Updated 3 months ago
- Embed a payload inside a PNG file☆371Oct 24, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- ☆11Aug 31, 2023Updated 2 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆37Sep 30, 2024Updated last year
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Red Team Server (RTS)☆16Apr 16, 2026Updated last month
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆43Sep 15, 2024Updated last year
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆315Nov 22, 2025Updated 5 months ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆471Nov 2, 2024Updated last year
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆34Jul 5, 2025Updated 10 months ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆23Mar 17, 2024Updated 2 years ago
- Zimbra - Remote Command Execution (CVE-2024-45519)☆136Apr 6, 2025Updated last year
- dump Chrome cookies remotely with atexec and CDP☆68Aug 10, 2024Updated last year
- Monster UI Application: Advanced configuration of KAZOO callflows using a drag-and-drop interface☆14Apr 10, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆56May 6, 2025Updated last year
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- IBAN Validation with country code check☆11Apr 29, 2016Updated 10 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 11 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 5 months ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆21Jan 28, 2021Updated 5 years ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆26Mar 21, 2024Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆191Jul 30, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Penetration Testing AI Assistant based on open source LLMs.☆137May 11, 2026Updated last week
- A reverse/bind shell generator utility☆11Jul 22, 2024Updated last year
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- ☆15Oct 18, 2024Updated last year
- Bot Auto Order Telegram☆20Jun 24, 2025Updated 10 months ago