Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.
☆43Dec 9, 2020Updated 5 years ago
Alternatives and similar repositories for KeySpark
Users that are interested in KeySpark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Sep 29, 2020Updated 5 years ago
- A general Javascript keylogger to be used in an XSS PoC☆18Feb 23, 2020Updated 6 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code for programming a Digispark to download and run a program.☆12Jul 10, 2017Updated 8 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- Secure network block device☆11Dec 29, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- ☆20Apr 21, 2020Updated 6 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 3 years ago
- a digispark arduino script to pop a reverse hidden shell to a specified ip address using netcat.☆43Feb 3, 2019Updated 7 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 months ago
- ☆17Mar 21, 2019Updated 7 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- Simple script for web directory scanning☆33Apr 23, 2026Updated last week
- Harden and secure your Debian or Debian based OS, with this simple zero-configuration Debian bash script☆18May 30, 2022Updated 3 years ago
- Virtual File System supporting Different Functions (adding , copying from and to Hard Disk , Deleting Files and Folders)☆11Jul 13, 2017Updated 8 years ago
- Notion C2 Profile for Mythic☆45Updated this week
- A FreePascal Custom Runtime for AWS Lambda☆12Jul 8, 2019Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 7 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- TLS fingerprint emulation upstream proxy replay any ClientHello☆46Apr 6, 2026Updated 3 weeks ago