HassanShehata / KeySparkLinks
Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.
☆43Updated 5 years ago
Alternatives and similar repositories for KeySpark
Users that are interested in KeySpark are comparing it to the libraries listed below
Sorting:
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Simple Karma Attack☆68Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- ☆53Updated 4 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Framework for exploiting local vulnerabilities☆84Updated 2 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Customized Kali Linux - Ansible playbook☆66Updated 5 years ago
- Automatically spin up infra for phishing☆65Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- python hash cracker☆52Updated last year
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- ☆25Updated 5 years ago
- ☆13Updated 8 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- A simple python reverse shell written just for fun.☆62Updated 2 years ago
- Hiding implants in HTML files☆66Updated 5 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Updated last week
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago