amaitou / DarkSpyLinks
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
☆49Updated last year
Alternatives and similar repositories for DarkSpy
Users that are interested in DarkSpy are comparing it to the libraries listed below
Sorting:
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- ☆28Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆25Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- POC exploit for CVE-2015-10141☆30Updated 3 weeks ago
- ☆14Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- Dogma V1.5.3☆31Updated 5 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆49Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- Sifter - All purpose penetration testing op-center☆78Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- ☆12Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated last year
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆36Updated 3 years ago