Simple TTY cheat sheet for shell stabilization
☆43Oct 25, 2020Updated 5 years ago
Alternatives and similar repositories for Reverse-Shell-TTY-Cheat-Sheet
Users that are interested in Reverse-Shell-TTY-Cheat-Sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Nov 4, 2023Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆44Jul 16, 2021Updated 4 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- POC for CVE-2024-23897 Jenkins File-Read☆39Nov 20, 2025Updated 4 months ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆13Jan 9, 2026Updated 2 months ago
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆13Dec 23, 2023Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Jan 5, 2026Updated 2 months ago
- ☆11Aug 3, 2022Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆37Apr 21, 2019Updated 6 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- tryhackme writeups☆13Jun 28, 2020Updated 5 years ago
- Official writeups for Hack The Boo CTF 2024☆55Dec 4, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12Aug 12, 2021Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆17Apr 27, 2025Updated 10 months ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 8 months ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆20Jun 8, 2021Updated 4 years ago
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- PowerShell module containing a set of generally useful tools.☆18Jan 10, 2026Updated 2 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆12Aug 12, 2021Updated 4 years ago
- ☆13Aug 12, 2021Updated 4 years ago
- Best Tool For instagram bruteforce hacking Tool By EvilDevil☆12Aug 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Aug 16, 2021Updated 4 years ago
- Javascript payload that inject a malicious payload into the copy-buffer of the victim☆37May 25, 2018Updated 7 years ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated last month
- ☆12May 25, 2022Updated 3 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Write-ups of Try Hack me challenge machines☆10Mar 29, 2024Updated last year
- Execute shell commands from your local browser via websockets (terrible idea, only for demos)☆13Jan 17, 2026Updated 2 months ago