amaitou / DarkSpyLinks
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
☆50Updated last year
Alternatives and similar repositories for DarkSpy
Users that are interested in DarkSpy are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- POC exploit for CVE-2015-10141☆30Updated 2 months ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- PassBreaker☆63Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 7 months ago
- ☆28Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Sifter - All purpose penetration testing op-center☆81Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆90Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆51Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆43Updated 2 years ago
- Simple program to steal private files from removable storages☆87Updated 3 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆109Updated 2 years ago