Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell
☆26Mar 17, 2019Updated 7 years ago
Alternatives and similar repositories for supertty
Users that are interested in supertty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jan 31, 2020Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- ☆12Aug 29, 2025Updated 8 months ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- Command-line privilege elevation for Windows☆23Nov 27, 2016Updated 9 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Nov 30, 2017Updated 8 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- ☆15Sep 4, 2024Updated last year
- ☆12Oct 16, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- ☆58Feb 15, 2021Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Blind XSS service alerting over slack or email☆29Aug 6, 2019Updated 6 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Automated enumeration☆30Apr 14, 2021Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated 2 months ago
- Python PTY backdoors - full PTY or nothing!☆753Jul 28, 2014Updated 11 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- WIP - Revamped Alfred [2.0]☆40May 8, 2025Updated last year
- A Web Server to hide stuff☆21Apr 29, 2022Updated 4 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 8 years ago
- Bad Apple in Amiga Anim format, complete with a guide on how to make your own Sound Anims☆10Jul 2, 2020Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago