Shell to bypass cmd usage restrictions on Windows.
☆30Apr 2, 2021Updated 4 years ago
Alternatives and similar repositories for bysh
Users that are interested in bysh are comparing it to the libraries listed below
Sorting:
- CLASH taken to the very next level.☆10Oct 15, 2021Updated 4 years ago
- Virtual machine with associated language written in Rust☆19Jan 3, 2021Updated 5 years ago
- Nixt is an interpreted programming language written in Rust☆16Jan 17, 2021Updated 5 years ago
- A NodeJS Application that transcripts Markdown to HTML, supporting MathJax and with GitHub flavoured style. Serving itself as a server.☆11Dec 12, 2022Updated 3 years ago
- Inverted pendulum simulation on the terminal using c☆16Feb 10, 2025Updated last year
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- ☆11May 24, 2020Updated 5 years ago
- 1secmail disposable temp mail service from terminal☆12Dec 5, 2022Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- yf is a CLI tool that allows for quick and easy access to Yahoo! Finance market data.☆21May 15, 2021Updated 4 years ago
- 😎 A curated list of awesome resources for software engineer onboarding☆24Apr 2, 2021Updated 4 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 7 years ago
- Deduplicating VCS for large binary files in Go☆14Oct 6, 2022Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Simple python file that sends victim ip,host name,location etc.., to your mail address☆14Jan 8, 2023Updated 3 years ago
- windows11-GTKtheme☆10Sep 20, 2021Updated 4 years ago
- hacklock is a bash based script which is officially termux from this tool in just one click you can generate pattern phishing tool which …☆15Aug 25, 2020Updated 5 years ago
- /dev/amogus☆12May 31, 2021Updated 4 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- Interactive Web Plotting for Python☆10Apr 1, 2019Updated 6 years ago
- Revisiting a classic tool, the file pumper! 💦☆16Apr 16, 2020Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Dec 14, 2020Updated 5 years ago
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- Remove spectre mitigation from binaries that don't need it☆14Dec 23, 2020Updated 5 years ago
- TerminalChat is a console based instant messaging application made for hackers written in python3 & php. Gives all Basic Messaging Functi…☆11Jan 10, 2021Updated 5 years ago
- Simple CLI tool to generate essential repository badges with ease☆19Oct 25, 2023Updated 2 years ago
- Managed C# library for handling KTX File Format☆13Nov 18, 2025Updated 4 months ago
- I have starred over 2,700 repos on GitHub, and it's difficult to track/organize them. This is a tool to easily visualize and search your …☆22Mar 12, 2023Updated 3 years ago
- Send a spoofed email and receive the IP address of the user who opened it☆16Jun 2, 2020Updated 5 years ago
- MiMa Plugin for Mill☆17Feb 18, 2026Updated last month
- A Mill plugin to submit your dependency graph to the GitHub Dependency Graph API☆14Apr 18, 2025Updated 11 months ago
- The fastest way to create complex web applications in Scala!☆17Updated this week
- CLAIR agrège, croise et présente de manière accessible les données publiques sur l'activité des parlementaires (députés et sénateurs), le…☆30Updated this week