amaitou / DarkSpyView external linksLinks
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
☆51Jan 20, 2026Updated 3 weeks ago
Alternatives and similar repositories for DarkSpy
Users that are interested in DarkSpy are comparing it to the libraries listed below
Sorting:
- A potent tool designed for efficiently cracking MD5 hashes using an online wordlist. This repository provides a robust solution for secur…☆13Jul 26, 2024Updated last year
- Config file of my Github profile that comes as a description about Me, My Studies as well as the projects That I do☆17Jan 27, 2026Updated 2 weeks ago
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Jul 26, 2024Updated last year
- This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linea…☆23Jul 26, 2024Updated last year
- "TheJudgment," a captivating steganography challenge that will test your skills in uncovering hidden messages. Immerse yourself in a worl…☆17Jun 1, 2024Updated last year
- Discover sorting algorithms and core data structures implemented in multiple languages in my repository. Perfect for beginners and experi…☆43Aug 16, 2024Updated last year
- A Responsive Landing Page For A Restaurant☆17Jun 1, 2024Updated last year
- Landing Page For Computers Repair Services Website☆14Jun 1, 2024Updated last year
- HKG's Official Website☆34Apr 19, 2024Updated last year
- This repository consists of 1337/42 Pool as well as the submodules of each 42 project that I have made, check the repository for more inf…☆13Dec 28, 2024Updated last year
- Landing Page For A Tv E-commerce Website☆37Apr 19, 2024Updated last year
- Command and Control Framework☆13Mar 23, 2024Updated last year
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 2 months ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- ☆14Oct 17, 2022Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- ☆133Jan 25, 2023Updated 3 years ago
- ☆13Oct 18, 2022Updated 3 years ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 6 months ago
- ☆23Jan 29, 2023Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- A Python obfuscator using HTTP Requests and Hastebin.☆50Jul 1, 2022Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- Facebook bot dumper&scraper☆39Oct 13, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Oct 2, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Geting IP Informations☆27Oct 29, 2024Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Jul 31, 2023Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆26May 22, 2023Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 6 months ago
- ☆15Oct 6, 2022Updated 3 years ago
- Piso wifi vendo trolling tool☆13Dec 14, 2023Updated 2 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆46Jan 2, 2022Updated 4 years ago