Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding
☆15Nov 10, 2020Updated 5 years ago
Alternatives and similar repositories for escalator
Users that are interested in escalator are comparing it to the libraries listed below
Sorting:
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆15Nov 7, 2020Updated 5 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Make Your Passwords Cracking easier! Crack any kinda pwds within just few minutes!!☆18Oct 26, 2020Updated 5 years ago
- For Spamming | BOT (Spam anywhere) or in Social Media Comment Section!☆11Jan 1, 2021Updated 5 years ago
- Powerful, unbearable DDoS Tool☆11Feb 7, 2021Updated 5 years ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆26Jul 23, 2021Updated 4 years ago
- This Tool is a Powerful dos & ddos Tool to create heavy load on the Servers, exhausting the resources thus, making web servers nonrespon…☆21Oct 26, 2020Updated 5 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- An open-source .NET Ransomware☆24Aug 2, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 3 years ago
- ☆13May 20, 2023Updated 2 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆56Jun 8, 2021Updated 4 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- Check For Valid Emails in Bulk!☆12Nov 17, 2020Updated 5 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- ☆13Apr 30, 2023Updated 2 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 7 months ago
- Facebook bot dumper&scraper☆39Oct 13, 2024Updated last year
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆13Mar 16, 2022Updated 3 years ago
- buffer-overflow☆15Feb 2, 2022Updated 4 years ago
- A sleek remote administration tool☆12Jan 30, 2021Updated 5 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 4 months ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- ☆18Dec 12, 2020Updated 5 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Termux Nethunter GUI Installer☆51Oct 3, 2024Updated last year
- IP and geolocation tracking tool☆61Oct 3, 2024Updated last year
- A Free PHP Interface with VB.NET based Stub and Builder BotNET☆23Jan 9, 2019Updated 7 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆22Jun 30, 2024Updated last year
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆114Jan 2, 2022Updated 4 years ago
- Virus Repository☆28Jan 2, 2022Updated 4 years ago