A reverse shell cheat-sheet tool
☆39Mar 5, 2019Updated 7 years ago
Alternatives and similar repositories for shell_lover
Users that are interested in shell_lover are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- some example ctf writeups☆27Oct 23, 2020Updated 5 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Get a clean, ready-to-go Linux box in seconds.☆25Mar 12, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 9 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 8 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- AN ESP32/8266 is used to receive sensor data from clients and then log and display the results☆22Sep 24, 2022Updated 3 years ago
- 网站数据抓取☆10Apr 15, 2018Updated 8 years ago
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 7 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Jan 5, 2023Updated 3 years ago
- ☆16Apr 4, 2016Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。☆10Apr 2, 2019Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Reconnaissance scripts for penetration testing☆59Jul 7, 2015Updated 10 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Jan 10, 2019Updated 7 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- python ip proxy tool scrapy crawl. 抓取大量免费代理 ip,提取有效 ip 使用☆11Jan 29, 2018Updated 8 years ago
- Auto save instagram users stories and posts☆33Mar 26, 2018Updated 8 years ago
- Gadget Pentesting Tool Scripts☆37Nov 29, 2015Updated 10 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 8 years ago
- Python botnet☆12Aug 15, 2015Updated 10 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- detect trojans in an easy way 🛡️☆29Jul 25, 2018Updated 7 years ago
- How to make a rocket catch a target?☆11Aug 6, 2017Updated 8 years ago
- ☆11Nov 15, 2020Updated 5 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- Set of scripts and tools to manage my Docker containers☆12Mar 21, 2026Updated last month
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 7 years ago