MuirlandOracle / Rickroll-ServerLinks
Python TCP server for terminal rickrolls
☆12Updated 3 years ago
Alternatives and similar repositories for Rickroll-Server
Users that are interested in Rickroll-Server are comparing it to the libraries listed below
Sorting:
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 7 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Command line client for HackTheBox☆23Updated last year
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 3 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆28Updated 2 years ago
- Automate converting webshells into reverse shells.☆69Updated 3 weeks ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine.☆57Updated 6 months ago
- ☆44Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 months ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆16Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆20Updated 3 years ago
- CATANA - CUT your Wordlist!☆14Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 9 months ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆20Updated 3 years ago
- A C2 framework built for my bachelors thesis☆56Updated 10 months ago
- PoCs of (outdated) privilege escalation vulnerability☆13Updated 8 months ago
- Reverse Shell troll software☆12Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆55Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆52Updated 2 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆49Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Yet Another PHP Shell - The most complete PHP reverse shell☆83Updated 3 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year