☆19Jan 3, 2024Updated 2 years ago
Alternatives and similar repositories for shellsploit-framework
Users that are interested in shellsploit-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 12 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Super user's toolkit☆27Sep 6, 2022Updated 3 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- statistics ASCII circle for analysing byte entropy in files☆23Aug 15, 2021Updated 4 years ago
- x86 Microkernel☆16Apr 1, 2020Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- Archlinux ARM docker repository☆11May 11, 2020Updated 5 years ago
- Reverse engineering challenges☆52Nov 3, 2019Updated 6 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 5 years ago
- A branch of https://github.com/webRTC to support data-only connections☆37Nov 9, 2013Updated 12 years ago
- This is a fork of jcrocholl/Marlin , add mege controller and mini panel support☆14Aug 23, 2014Updated 11 years ago
- A simple interpreter☆19Nov 13, 2018Updated 7 years ago
- Plymouth theme for the Breeze visual style for the Plasma Desktop☆17Apr 7, 2026Updated 3 weeks ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 9 years ago
- Partially implements the luafilesystem module for gopher-lua☆19Nov 24, 2020Updated 5 years ago
- Performs active information gathering about Joomla sites☆17Jul 13, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- hack a wifi client using this tool☆13Dec 14, 2023Updated 2 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- Unix Based Command☆18Apr 28, 2026Updated last week
- ☆12Jul 2, 2018Updated 7 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- ☆11Mar 27, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A small collection of OSINT data collection tools.☆17Jun 14, 2019Updated 6 years ago
- ☆12Apr 2, 2023Updated 3 years ago
- tim client in go☆12Feb 28, 2025Updated last year
- Collection of scripts for passing through the usb-devices to VMs☆19Aug 18, 2019Updated 6 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Deprecated Repository☆12Jan 18, 2019Updated 7 years ago
- Your phone's location tracker using PyiCloudService including reverse geocoding☆20Aug 30, 2023Updated 2 years ago