Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding
☆16Nov 10, 2020Updated 5 years ago
Alternatives and similar repositories for escalator
Users that are interested in escalator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆11Jan 2, 2021Updated 5 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆16Nov 7, 2020Updated 5 years ago
- Make Your Passwords Cracking easier! Crack any kinda pwds within just few minutes!!☆19Oct 26, 2020Updated 5 years ago
- For Spamming | BOT (Spam anywhere) or in Social Media Comment Section!☆12Jan 1, 2021Updated 5 years ago
- This Tool is a Powerful dos & ddos Tool to create heavy load on the Servers, exhausting the resources thus, making web servers nonrespon…☆22Oct 26, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆16Oct 26, 2020Updated 5 years ago
- Download Youtube Video's in Both MP3 & MP4 format! | Multi video's + playlist Downloader Support☆10Nov 28, 2020Updated 5 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆56Jun 8, 2021Updated 4 years ago
- Check For Valid Emails in Bulk!☆13Nov 17, 2020Updated 5 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- An open-source .NET Ransomware☆23Aug 2, 2021Updated 4 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆27Oct 3, 2025Updated 6 months ago
- ☆13May 20, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Facebook bot dumper&scraper☆41Oct 13, 2024Updated last year
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 9 months ago
- ☆13Apr 30, 2023Updated 3 years ago
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆35Nov 29, 2025Updated 5 months ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Remote Email Keylogger☆14Jun 2, 2022Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆21Aug 4, 2020Updated 5 years ago
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 3 years ago
- You can encode and decode base85, ascii85, base64, base32, and base16 with this tool.☆11Oct 4, 2023Updated 2 years ago
- IP and geolocation tracking tool☆62Oct 3, 2024Updated last year
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is a multipurpose tool which is useful in networking or network hacking.☆85Apr 15, 2023Updated 3 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆24Jun 30, 2024Updated last year
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Sep 7, 2019Updated 6 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago