A collection of reverse shells
β33Aug 3, 2019Updated 6 years ago
Alternatives and similar repositories for Awesome-Reverse-Shell
Users that are interested in Awesome-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- π A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.β12Oct 1, 2019Updated 6 years ago
- A curated list of awesome DNS resources.β23Jan 18, 2025Updated last year
- POC FortiOS SSL-VPN buffer overflow vulnerabilityβ27Jun 16, 2023Updated 2 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.β27Mar 9, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.β40Feb 10, 2022Updated 4 years ago
- Code for CorvOS - A Linux distro for schoolsβ12May 13, 2019Updated 6 years ago
- β16May 13, 2021Updated 4 years ago
- Terrain Mesh Generator implemented in C/C++ using ImGui and OpenGL libraries.β18Apr 7, 2025Updated 10 months ago
- Perl script to generate "quality-of-guess" feedback for users about their requested Slurm walltimes.β10Jul 15, 2018Updated 7 years ago
- PowerCLI Scriptsβ14Aug 10, 2019Updated 6 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using maliciousβ¦β15Jan 21, 2025Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEsβ10Nov 29, 2020Updated 5 years ago
- Python script to send SMS using Huawei new[er] USB dongles via the HTTP interfaceβ11Jul 10, 2017Updated 8 years ago
- A more realistic demo of a buffer overflow cause by -ffast-mathβ15Sep 10, 2022Updated 3 years ago
- The Wave theme for OXID eShopβ10Aug 7, 2023Updated 2 years ago
- Eisen engine RESTful APIβ10Mar 11, 2017Updated 8 years ago
- Network Simulation of jitter, packet loss and time delayβ13Jul 16, 2018Updated 7 years ago
- Openshift / Origin object backup script.β11Nov 20, 2017Updated 8 years ago
- Kubernetes resource graph generatorβ10May 27, 2024Updated last year
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included functionβ¦β14Mar 9, 2023Updated 2 years ago
- β12Feb 20, 2025Updated last year
- β12Sep 29, 2025Updated 5 months ago
- Cheat sheetsβ10Jul 4, 2016Updated 9 years ago
- β10Aug 11, 2025Updated 6 months ago
- Gerber files for stencils based on official Espressif KiCad footprintsβ11Feb 10, 2026Updated 2 weeks ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228β13Dec 13, 2021Updated 4 years ago
- Modern cryptography primitives implemented in Scratch, via Boigaβ13Jul 16, 2022Updated 3 years ago
- Scan for open S3 buckets and dumpβ10Mar 8, 2018Updated 7 years ago
- how-to-write-a-node-cli-tools-with-commanderβ14Nov 22, 2014Updated 11 years ago
- β21Jan 7, 2019Updated 7 years ago
- Free cybersecurity training resourcesβ12Feb 5, 2020Updated 6 years ago
- All my POC related to malware developmentβ15Feb 19, 2026Updated last week
- Unofficial mirror of GNUK's submodule: Chopstxβ12Aug 15, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Aug 16, 2022Updated 3 years ago
- β12Jan 3, 2022Updated 4 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Timβ¦β10Jul 29, 2020Updated 5 years ago
- π Use Firecracker and helpings of bash to boot Ubuntu virtual machines very fast π₯β20Jul 15, 2023Updated 2 years ago
- create buckets for terraform tfstate files and set cross-region replication.β12Sep 17, 2017Updated 8 years ago
- break link between dll and it file on diskβ12Sep 2, 2024Updated last year