amaitou / DarkSpyLinks
DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. The reverse shell enables controlled operations on the remote system, including executing shell commands, capturing screenshots, downloading files, uploading files, and more.
☆50Updated last year
Alternatives and similar repositories for DarkSpy
Users that are interested in DarkSpy are comparing it to the libraries listed below
Sorting:
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆65Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆44Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Windows Hacking FrameWork using Reverse Shell☆106Updated 7 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- ☆28Updated 3 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆28Updated 3 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated 2 months ago
- Sifter - All purpose penetration testing op-center☆81Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆52Updated last year
- PassBreaker☆63Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- Social Engineering Browser Update Attack.☆57Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago