Communicate with a remote shell easily
☆12Dec 10, 2017Updated 8 years ago
Alternatives and similar repositories for shellcomm-php
Users that are interested in shellcomm-php are comparing it to the libraries listed below
Sorting:
- ☆17Oct 5, 2020Updated 5 years ago
- Login Crawler是一套基于Webmagic内核的,拓展了用户登录后抓取数据模块。☆13Apr 23, 2017Updated 8 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Vot.Ar: una mala eleccion☆19May 9, 2018Updated 7 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Jun 19, 2015Updated 10 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Bash simulator to control a server using PHP system functions.☆100Nov 21, 2020Updated 5 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- ☆59May 1, 2019Updated 6 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- ☆16Apr 24, 2022Updated 3 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago