Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.
☆24Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for PythonAdvancedHTTPReverseShell
Users that are interested in PythonAdvancedHTTPReverseShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Mar 21, 2019Updated 7 years ago
- An Android app that intercepts Medium articles, and opens them internally if they're premium.☆26Oct 26, 2019Updated 6 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Web Vulnerability Scanner using Shell Script☆60Jun 29, 2022Updated 3 years ago
- Common Hackable Adaptable Operating System☆14Sep 25, 2020Updated 5 years ago
- Python-Based Pentesting Framework☆31Dec 7, 2022Updated 3 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Jun 12, 2021Updated 4 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆32Mar 2, 2019Updated 7 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Dec 9, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Collection of OSCP study material && tools.☆78Apr 1, 2019Updated 7 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- ☆23Mar 27, 2019Updated 7 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆31Sep 6, 2019Updated 6 years ago
- A web application for generating custom XSS payloads☆79Dec 29, 2019Updated 6 years ago
- Tool made to automate tasks of pentesting.☆166Oct 26, 2019Updated 6 years ago
- Remote shell victim machines☆23Sep 13, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 7 months ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆90Updated this week
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- ☆25Aug 11, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Docker baseimage for GTK3 Broadway☆14Nov 10, 2022Updated 3 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- exploits.shodan.io's unofficial api no api-key needed☆16Apr 10, 2021Updated 4 years ago
- The ultimate Metasploit apk binder with legit apk written in python3☆35Feb 19, 2022Updated 4 years ago
- Writeup for the OverTheWire Advent Bonanza 2019 CTF (https://advent2019.overthewire.org/)☆14May 10, 2020Updated 5 years ago