Communicate with a remote shell easily
☆12Dec 10, 2017Updated 8 years ago
Alternatives and similar repositories for shellcomm-php
Users that are interested in shellcomm-php are comparing it to the libraries listed below
Sorting:
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Lost In Translation release. Contains FuzzBunch, DanderSpritz, and all the other NSA…☆20Apr 16, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- ☆16Apr 24, 2022Updated 3 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Vot.Ar: una mala eleccion☆19May 9, 2018Updated 7 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Aug 13, 2022Updated 3 years ago
- Bash simulator to control a server using PHP system functions.☆100Nov 21, 2020Updated 5 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- FIX (Financial Information eXchange) protocol fuzzer☆24Jul 22, 2022Updated 3 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- A list of windows potatoes!☆26Mar 6, 2022Updated 3 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Jun 19, 2015Updated 10 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- Colloide is a bruteforcing tool to find hidden pages, files and directories inside websites☆34Aug 6, 2021Updated 4 years ago
- Search public IP owner through ARIN☆60May 23, 2025Updated 9 months ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- 🎻 Tools for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.☆32Jul 15, 2017Updated 8 years ago
- Repo for Coursera's Data Science Specialization.☆15Oct 1, 2020Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- Support x86 and x64☆66Apr 17, 2021Updated 4 years ago