amaitou / DarkSpyLinks
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
☆49Updated last year
Alternatives and similar repositories for DarkSpy
Users that are interested in DarkSpy are comparing it to the libraries listed below
Sorting:
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- xdebug 2.5.5 RCE exploit☆31Updated 6 months ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 11 months ago
- Hacking with PasteJacking technique☆22Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- PassBreaker☆63Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- A reverse TCP payload and listener both written in python3.☆31Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆25Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- Windows Hacking FrameWork using Reverse Shell☆107Updated 4 months ago
- ☆28Updated 2 years ago
- Dogma V1.5.3☆31Updated 5 years ago
- A Simple Script For SSH BruteForce☆36Updated 2 years ago
- ☆14Updated 3 years ago
- ☆12Updated 2 years ago
- Sifter - All purpose penetration testing op-center☆76Updated 2 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆108Updated 2 years ago
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated last year