A quick reference script that can easily display reverse shells for different languages.
☆20May 28, 2020Updated 5 years ago
Alternatives and similar repositories for reverseme
Users that are interested in reverseme are comparing it to the libraries listed below
Sorting:
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 8 months ago
- ☆17May 7, 2021Updated 4 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Introduction to CYS4-SensitiveDiscoverer, a Burp extension that discovers sensitive information inside HTTP messages.☆23Nov 26, 2024Updated last year
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Sep 26, 2020Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A CherryTree template for People OSINT. I was inspired by James Hall's CTF template and I used the lessons taught to me by Joe Gray to cr…☆11Aug 16, 2020Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 13, 2026Updated last week
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- ☆26Sep 1, 2022Updated 3 years ago
- Python Exploitation Framework☆35Mar 9, 2026Updated last week
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- ☆33Feb 25, 2022Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last month
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- A Directory Bruteforcing Tool That Makes Your Life Easier!☆17Aug 29, 2023Updated 2 years ago
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 2 years ago
- Cisco Adaptive Security Appliance and FTD Unauthorized Remote File Reading☆17Jul 28, 2020Updated 5 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 7 years ago
- small python3 tool to check common vulnerabilities in SMTP servers☆162Apr 21, 2023Updated 2 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆40Aug 13, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- RDP POC☆19Jun 1, 2019Updated 6 years ago