windows tiny reverse shell
☆27Mar 21, 2022Updated 4 years ago
Alternatives and similar repositories for dty
Users that are interested in dty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Polymorphic code obfuscator for use in Red Team operations☆33Apr 13, 2022Updated 4 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 5 months ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆84Aug 18, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Telsca is an open-source tool for scraping Telegram data. Extract messages, user info, and media files, saving them in CSV or JSON format…☆12Aug 4, 2024Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- Pentesting notes☆19Apr 30, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆258May 25, 2023Updated 2 years ago
- ☆57Aug 19, 2024Updated last year
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Dec 5, 2018Updated 7 years ago
- ☆20Oct 23, 2020Updated 5 years ago
- ☆17Jun 13, 2022Updated 3 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- An AV exclusion enumeration tool written in Python.☆60Feb 17, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Get the absolute file path to a bin entry of an installed dependency☆17May 4, 2022Updated 4 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- ☆16May 9, 2016Updated 10 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Mara is a userland pty/tty sniffer☆53Dec 22, 2023Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆75May 2, 2022Updated 4 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Combine words from two wordlist files and concatenate them with an optional delimiter☆39Sep 25, 2023Updated 2 years ago
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago