A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
☆104Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for BCA-Phantom
Users that are interested in BCA-Phantom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Log keystrokes, take screenshots and grab system information from a target host and exfiltrate to Discord and Google Forms.☆20Jul 25, 2023Updated 2 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆16Jun 30, 2023Updated 2 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Aug 19, 2023Updated 2 years ago
- For pentesters who don't wanna leave their terminals.☆183Aug 27, 2021Updated 4 years ago
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆461Oct 30, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows Reverse TCP Shellcode ( 420 Bytes )☆21Feb 14, 2022Updated 4 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- Streaming Log Multiplexer - combine multiple logs to one☆11Jan 4, 2023Updated 3 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆79Jan 1, 2025Updated last year
- fully automated pentesting tool☆520Dec 8, 2022Updated 3 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆31Oct 12, 2021Updated 4 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Apr 29, 2019Updated 6 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆83Dec 9, 2022Updated 3 years ago
- ☆38Apr 7, 2023Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆22Mar 24, 2024Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 5 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆352Oct 22, 2024Updated last year
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Reasonably undetected shellcode stager and executer.☆34May 23, 2025Updated 10 months ago
- ☆99May 3, 2018Updated 7 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- Read my blog for more info -☆30Apr 27, 2021Updated 4 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell