A repository of compiled and ready-to-use shells for Windows restricted environments.
☆36Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for Shells-for-restricted-environments
Users that are interested in Shells-for-restricted-environments are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- A repository dedicated to terminal escape injections.☆68Apr 16, 2020Updated 6 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- ip-keyloger☆11Jan 9, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- P2P cryto-currency with dashpay and blackcoin Hybird feature☆12Feb 28, 2022Updated 4 years ago
- Mozilla Firefox Tweaks. Use at your own risk and fun.☆17Nov 27, 2023Updated 2 years ago
- ☆12Nov 5, 2022Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆292Nov 21, 2020Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- A port of Rack for the JavaScript JSGI web server interface☆36Oct 14, 2010Updated 15 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- keyloger with python☆10Nov 24, 2018Updated 7 years ago
- Tool to dump cisco device configs via snmp and/or add new users☆13May 8, 2026Updated 2 weeks ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 7 years ago
- Movement Detector using python☆10Jan 5, 2021Updated 5 years ago
- A platform Where A User can Find the Online Presence of Social Media Handle on the Internet.☆12Apr 10, 2021Updated 5 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 4 months ago
- Main files for the Hak5 LAN Turtle☆15Jul 26, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Work in Progress repo☆16Apr 18, 2019Updated 7 years ago
- ☆17Apr 5, 2021Updated 5 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- Python scripts to maintain Monero opennodes DNS records☆19Mar 10, 2024Updated 2 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆40Jul 10, 2021Updated 4 years ago
- ☆18Nov 5, 2022Updated 3 years ago
- A chat application with end to end encryption with centralized authentication system using Raspberry pi and a 4x4 Matrix Keypad for secur…☆13Mar 21, 2023Updated 3 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆33Jan 28, 2026Updated 3 months ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆21Jul 9, 2019Updated 6 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Json Extraction From Flash☆25Aug 8, 2018Updated 7 years ago
- OWASP Foundation Web Repository☆18Feb 19, 2026Updated 3 months ago
- A dynamic & responsive website for buying and selling products. Shop owners can create a separate page for their website & offer their pr…☆16Jun 23, 2022Updated 3 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆45Jun 5, 2023Updated 2 years ago