Remote shell victim machines
☆23Sep 13, 2019Updated 6 years ago
Alternatives and similar repositories for black-witch-botnet
Users that are interested in black-witch-botnet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ssh protector. to build dynamtic iptables 小黑屋,专门收集肉鸡的ip地址☆16Jun 16, 2020Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A web application for generating custom XSS payloads☆79Dec 29, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 2 months ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- An unauthenticated PoC for CVE-2020-0796☆22Mar 15, 2020Updated 6 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Chinese Translation for Bartosz Milewski's 'Category Theory for Programmers'. 《写给程序员的范畴论》中文翻译 欢迎 PR☆12Oct 4, 2024Updated last year
- ☆14Aug 27, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Jan 2, 2020Updated 6 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- GoodERP,一切从简,按需就繁,OCC,Odoo Chinese Community,服务于小型制造企业。(GoodERP,as simple as possible,as complex as needed,for small-sized manufacture en…☆10Oct 20, 2019Updated 6 years ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- Code record☆14Aug 4, 2019Updated 6 years ago