Reverse Shell - technique is commonly used in cyber attacks
☆20Mar 2, 2024Updated 2 years ago
Alternatives and similar repositories for Reverse-TCP-Shell
Users that are interested in Reverse-TCP-Shell are comparing it to the libraries listed below
Sorting:
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 11 months ago
- Android program to change the IMEI identifiers of slots on the phone under the ARM architecture☆212Nov 24, 2025Updated 3 months ago
- proof of concept of user-mode anti-breakpoint technique☆16Sep 15, 2023Updated 2 years ago
- Shellcode Loader Library.☆14Sep 21, 2025Updated 6 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Oct 16, 2024Updated last year
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- The "Online Store" project, written in FastAPI, using microservice architecture.☆17Mar 20, 2025Updated last year
- LiteSpeed Cache Privilege Escalation PoC☆21Aug 25, 2024Updated last year
- An AutoIt obfuscator, written in AutoIt☆13Jul 17, 2020Updated 5 years ago
- PowerShell script to generate ShellCode in various formats☆45Sep 25, 2024Updated last year
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- git svn clone of official repo☆20Apr 5, 2011Updated 14 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- ☆46Sep 24, 2025Updated 5 months ago
- Random UI Fuzzer (Monkey-Fuzzer) for finding bugs in Windows Forms☆10Oct 27, 2019Updated 6 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)☆95Jul 5, 2024Updated last year
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆26Jun 12, 2024Updated last year
- IDA Pro script to find interesting syscalls and patterns in binaries☆22Oct 18, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- A collection of scripts and configurations for hardening various systems and applications.☆29Jul 26, 2024Updated last year
- Blockchain Technologies - The course is divided into [6 modules]: 1. Distributed Systems & Consensus, 2. Cryptoeconomics & Proof-of-Stake…☆15Oct 21, 2025Updated 5 months ago
- Locust.io Awesomeness is here☆13Oct 11, 2017Updated 8 years ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- Windows Internals 7th book but free (PDF)☆19Dec 3, 2024Updated last year
- ☆15Dec 25, 2022Updated 3 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆31Aug 8, 2022Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Learning materials, vulnerable demo app, and scripts related to the Client-Side Injections Part II YouTube Video☆30Oct 25, 2025Updated 4 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year