A keystroke / terminal logger for Linux.
☆218Jul 10, 2024Updated last year
Alternatives and similar repositories for shelljack
Users that are interested in shelljack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Inject shellcode into running processes in Linux.☆44Jul 10, 2024Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆471Jul 10, 2024Updated last year
- A collection of scripts which may come in handy during your freedom fighting activities.☆417May 8, 2023Updated 3 years ago
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- A ptrace library for easy syscall injection in Linux.☆186Jul 10, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Mara is a userland pty/tty sniffer☆53Dec 22, 2023Updated 2 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- A tool / library for simplifying string obfuscation with xor.☆21Jul 10, 2024Updated last year
- Remote administration service which uses twitter as a command and control server☆718Feb 25, 2021Updated 5 years ago
- A tool for harvesting sysadmin credentials in Linux☆20Jul 10, 2024Updated last year
- A C# implementation of the PowerShell Empire Agent☆73Apr 22, 2019Updated 7 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- A default credential scanner.☆1,505Jul 8, 2025Updated 10 months ago
- Remote Recon and Collection☆461Nov 23, 2017Updated 8 years ago
- socks4 reverse proxy for penetration testing☆648Jul 12, 2018Updated 7 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- Freedom Fighting Mode: open source hacking harness☆348Apr 6, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- A handy collection of my public exploits, all in one place.☆673Jan 6, 2026Updated 4 months ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆133May 27, 2019Updated 6 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆310Oct 27, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 11 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆795Sep 30, 2020Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆226May 8, 2021Updated 5 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆49Dec 7, 2018Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31May 6, 2016Updated 10 years ago