Python reverse shell.
☆298Nov 10, 2023Updated 2 years ago
Alternatives and similar repositories for Turtle
Users that are interested in Turtle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AWS commands, snippets, scripts, and more.☆26Nov 10, 2023Updated 2 years ago
- Python tool.☆12Nov 13, 2023Updated 2 years ago
- Crawler for adding videos to thenewboston.com☆26Nov 12, 2023Updated 2 years ago
- Python 3 Reverse Shell☆26Jan 2, 2022Updated 4 years ago
- Python network packet sniffer.☆257Nov 10, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Responsive chatroom design.☆33Nov 10, 2023Updated 2 years ago
- Linux backdoor implementation written in Python☆58May 25, 2015Updated 10 years ago
- Boilerplate for using React to make API calls.☆22Nov 13, 2023Updated 2 years ago
- thenewboston video API☆16Nov 13, 2023Updated 2 years ago
- Python wrapper for the Stock Data API.☆27Nov 12, 2023Updated 2 years ago
- Parses HTML to JSON.☆173Nov 10, 2023Updated 2 years ago
- Python Design Patterns☆443Jan 2, 2019Updated 7 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Reverse Shell with Python 3☆26Dec 25, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- ☆12Aug 29, 2025Updated 7 months ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆69Feb 20, 2016Updated 10 years ago
- Android app for thenewboston social network.☆56Nov 11, 2023Updated 2 years ago
- Simple C# reverse shell with shellcode and process injection☆40May 13, 2016Updated 9 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Mar 17, 2021Updated 5 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 9 years ago
- Android app for thenewboston educational videos and tutorials.☆96Nov 11, 2023Updated 2 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Oct 10, 2015Updated 10 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- ☆19Mar 22, 2015Updated 11 years ago
- Boilerplate for React webpack build.☆29Nov 13, 2023Updated 2 years ago
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆66Jun 5, 2018Updated 7 years ago
- Here is the source code from all of my tutorials.☆2,175Mar 28, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python botnet and backdoor☆1,617Mar 2, 2023Updated 3 years ago
- some python3 functions to add spreading features to any python backdoor☆56Jan 22, 2017Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Contains various python programs and proof of concept.☆10Nov 30, 2015Updated 10 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago