Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding
☆16Nov 10, 2020Updated 5 years ago
Alternatives and similar repositories for escalator
Users that are interested in escalator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆11Jan 2, 2021Updated 5 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆16Nov 7, 2020Updated 5 years ago
- Make Your Passwords Cracking easier! Crack any kinda pwds within just few minutes!!☆19Oct 26, 2020Updated 5 years ago
- For Spamming | BOT (Spam anywhere) or in Social Media Comment Section!☆12Jan 1, 2021Updated 5 years ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆28Jul 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆16Oct 26, 2020Updated 5 years ago
- Download Youtube Video's in Both MP3 & MP4 format! | Multi video's + playlist Downloader Support☆10Nov 28, 2020Updated 5 years ago
- Advance OTP Bypass Tool. Termux Supported.☆117Feb 23, 2026Updated last month
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆57Jun 8, 2021Updated 4 years ago
- Check For Valid Emails in Bulk!☆13Nov 17, 2020Updated 5 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- ☆13May 20, 2023Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 8 months ago
- ☆13Apr 30, 2023Updated 2 years ago
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆35Nov 29, 2025Updated 4 months ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- Remote Email Keylogger☆14Jun 2, 2022Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Termux Nethunter GUI Installer☆52Oct 3, 2024Updated last year
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 3 years ago
- You can encode and decode base85, ascii85, base64, base32, and base16 with this tool.☆11Oct 4, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 7 years ago
- This is a multipurpose tool which is useful in networking or network hacking.☆86Apr 15, 2023Updated 2 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- Virus Repository☆28Jan 2, 2022Updated 4 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Sep 7, 2019Updated 6 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago