amaitou / DarkSpyLinks
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
☆50Updated last year
Alternatives and similar repositories for DarkSpy
Users that are interested in DarkSpy are comparing it to the libraries listed below
Sorting:
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆67Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- PassBreaker☆65Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆14Updated 5 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆37Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- POC exploit for CVE-2015-10141☆31Updated 3 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆59Updated last year