Black Hat Ethical Hacking | PHP Backdoor Shell v1.0
β19May 22, 2018Updated 7 years ago
Alternatives and similar repositories for BHEH_PHP_SHELL
Users that are interested in BHEH_PHP_SHELL are comparing it to the libraries listed below
Sorting:
- Find secrets and passwords in container images and file systemsβ15Nov 16, 2022Updated 3 years ago
- π Hardware USB keylogger project with Arduino.β17Feb 2, 2017Updated 9 years ago
- Black Hat Ethical Hacking - Official Theme for Conky Managerβ18Sep 6, 2024Updated last year
- Magspoof implementation via ESP8266 (ledunia)β21Jul 27, 2018Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repositoryβ19Jan 1, 2018Updated 8 years ago
- The optional MailPlugin used in ScarletCloud for MacOSβ11Jan 3, 2023Updated 3 years ago
- Phishing can't get any easier with Tilapiaβ11Jan 2, 2023Updated 3 years ago
- ATM Cards,Dumps + Pin , Cvv CC ,Track 1/2,hacking ,Carding- ICQ : 708047203β30Dec 15, 2016Updated 9 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]β31Oct 10, 2019Updated 6 years ago
- Python library for video editing, presentation video generation, motion graphics, shader art coding, and other video production tasksβ17Sep 17, 2024Updated last year
- Subdomain Bruteforce - Bounty Quick Codeβ31Sep 6, 2024Updated last year
- RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFCβ34Jul 13, 2023Updated 2 years ago
- Mr. Robot Badge Firmware Starter Pack.β31Apr 5, 2022Updated 3 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)β34Sep 22, 2017Updated 8 years ago
- The Veteran-focused integration process(VIP) is a Lean-Agile framework services the interest of Veterans through the efficient streamliniβ¦β13Jun 4, 2023Updated 2 years ago
- β16Feb 28, 2026Updated last week
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33May 1, 2022Updated 3 years ago
- TradeGPT is a full-stack cryptocurrency trading application that combines a modern Fresh (Deno) frontend with a Python (FastAPI) backend β¦β15Mar 1, 2025Updated last year
- These are the official datasets used on the Medicare.gov Hospital Compare Website provided by the Centers for Medicare & Medicaid Serviceβ¦β10Mar 12, 2018Updated 7 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in pythonβ10Apr 30, 2023Updated 2 years ago
- Exploiting: CVE-2021-41349β11Jan 6, 2022Updated 4 years ago
- since some people are selling that for $25 I decided to make one myself rq since it's really easy and people shouldn't waste their money β¦β11Feb 2, 2021Updated 5 years ago
- DD Liberator 3D Gun Blueprintβ16May 10, 2013Updated 12 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ41Sep 6, 2024Updated last year
- β43Oct 31, 2021Updated 4 years ago
- a collection of wordlist for different projectsβ12Oct 12, 2024Updated last year
- Control a TEA5767 fm radio with your Flipper Zeroβ10Apr 26, 2023Updated 2 years ago
- Artificial Intelligence, Machine learning and Deep Learning Resources. π FREE AI/ML/DL Resources - π Courses, π Blogs, π¬ Research, anβ¦β11Aug 2, 2022Updated 3 years ago
- Tutorials and Things to Do while Hunting Vulnerability.β13Aug 30, 2022Updated 3 years ago
- The backend for the rewritten hidden tear ransomwareβ10May 22, 2024Updated last year
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer β¦β13Oct 16, 2017Updated 8 years ago
- Repository with simples C binary samples for beginners REs & Defendersβ10May 29, 2024Updated last year
- Recreating the HG/SS Pokewalker using legit ROM dumps for FlipperZeroβ11Nov 29, 2023Updated 2 years ago
- C++/Tcl, a library that allows to easily integrate C++ and Tcl.β12Apr 26, 2018Updated 7 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.β10Jan 18, 2022Updated 4 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.β12Jul 13, 2022Updated 3 years ago
- Flipper Zero FW [insane]β10Sep 9, 2022Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bountyβ13Apr 30, 2021Updated 4 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Informationβ14Apr 22, 2022Updated 3 years ago