A keystroke / terminal logger for Linux.
☆217Jul 10, 2024Updated last year
Alternatives and similar repositories for shelljack
Users that are interested in shelljack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- A collection of scripts which may come in handy during your freedom fighting activities.☆416May 8, 2023Updated 2 years ago
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- A ptrace library for easy syscall injection in Linux.☆184Jul 10, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Jul 10, 2024Updated last year
- Remote administration service which uses twitter as a command and control server☆719Feb 25, 2021Updated 5 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Credentials catching honeypot☆390May 21, 2024Updated last year
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- A default credential scanner.☆1,504Jul 8, 2025Updated 9 months ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- socks4 reverse proxy for penetration testing☆643Jul 12, 2018Updated 7 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- Freedom Fighting Mode: open source hacking harness☆346Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- A handy collection of my public exploits, all in one place.☆672Jan 6, 2026Updated 3 months ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆793Sep 30, 2020Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆226May 8, 2021Updated 4 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Dec 7, 2018Updated 7 years ago