A reverse shell cheat-sheet tool
☆39Mar 5, 2019Updated 6 years ago
Alternatives and similar repositories for shell_lover
Users that are interested in shell_lover are comparing it to the libraries listed below
Sorting:
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- This api maked for "https://koinim.com/". This company haven't an api. But if you want use koinim api, use this script. It works splinter…☆10Nov 23, 2014Updated 11 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- 网站数据抓取☆10Apr 15, 2018Updated 7 years ago
- python ip proxy tool scrapy crawl. 抓取大量免费代理 ip,提取有效 ip 使用☆11Jan 29, 2018Updated 8 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。☆10Apr 2, 2019Updated 6 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 7 years ago
- ☆15Dec 27, 2020Updated 5 years ago
- some example ctf writeups☆27Oct 23, 2020Updated 5 years ago
- ☆16Apr 4, 2016Updated 9 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Jan 5, 2023Updated 3 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Oct 10, 2016Updated 9 years ago
- AN ESP32/8266 is used to receive sensor data from clients and then log and display the results☆22Sep 24, 2022Updated 3 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Jan 10, 2019Updated 7 years ago
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Reconnaissance scripts for penetration testing☆59Jul 7, 2015Updated 10 years ago
- A badass grabbing tool for getting PDF's of books.☆26Aug 23, 2018Updated 7 years ago
- 恶意软件分析套件☆30Jun 27, 2017Updated 8 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- detect trojans in an easy way 🛡️☆29Jul 25, 2018Updated 7 years ago
- Auto save instagram users stories and posts☆31Mar 26, 2018Updated 7 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- 收集国内外开源CMS存在漏洞的各种版本☆29Aug 14, 2018Updated 7 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- DNS Spoof☆31Jun 23, 2020Updated 5 years ago
- An ESP8266-based Wake-on-LAN server☆32Aug 3, 2017Updated 8 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago