List of payloads: reverse shell, bind shell, webshell.
☆66Feb 11, 2026Updated last month
Alternatives and similar repositories for Shells
Users that are interested in Shells are comparing it to the libraries listed below
Sorting:
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- An advanced library for protecting/obfuscating kernel drivers using the C++ 17 standard.☆25Mar 9, 2026Updated last week
- ☆45Nov 5, 2023Updated 2 years ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆50Feb 6, 2026Updated last month
- High-efficiency federation protocol for microblogging (rfc)☆26Dec 23, 2025Updated 2 months ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- ☆12Aug 3, 2025Updated 7 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 8 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆124Jan 7, 2026Updated 2 months ago
- ☆19Sep 1, 2025Updated 6 months ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- Python client library for the AT Protocol (Bluesky)☆17Oct 5, 2024Updated last year
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated last month
- GENERATE PYTHON BASED FUD STUB☆19Nov 20, 2023Updated 2 years ago
- Taproot - All-in-one AT Protocol Explorer A comprehensive web-based explorer for the atproto ecosystem. View, explore, and interact with …☆34Feb 17, 2026Updated last month
- ☆44Mar 5, 2026Updated 2 weeks ago
- ☆35Oct 6, 2025Updated 5 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 7 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- HVNC PoC (Hidden VNC) in Rust☆40Sep 2, 2025Updated 6 months ago
- POC for CVE-2025-54918 and a technical demonstration.☆56Jan 12, 2026Updated 2 months ago
- ☆16May 6, 2021Updated 4 years ago
- Convert FBX animation files to VRMA format☆26Feb 23, 2026Updated 3 weeks ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- ☆19Jan 14, 2026Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- A Burp extension to Fuzz URLs for HTTP parser inconsistencies☆12Jan 9, 2024Updated 2 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Linux Shared Library to Shellcode Loader☆88Feb 15, 2026Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆222Oct 28, 2025Updated 4 months ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 10 months ago
- ☆16Jan 23, 2026Updated last month
- notes and ramblings from my OSCP/PenTesting Studies☆95Oct 25, 2023Updated 2 years ago
- PoC☆135Feb 11, 2026Updated last month
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last month
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago