amaitou / DarkSpyLinks
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
☆49Updated last year
Alternatives and similar repositories for DarkSpy
Users that are interested in DarkSpy are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆28Updated 4 years ago
- POC exploit for CVE-2015-10141☆30Updated 4 months ago
- ☆28Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 9 months ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated 2 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆49Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated 2 weeks ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- An open-source .NET Ransomware☆24Updated 4 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Updated 5 years ago