X-Platform bind shell in TypeScript!
☆30Jul 11, 2025Updated 9 months ago
Alternatives and similar repositories for f11
Users that are interested in f11 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Directory/File, DNS and VHost busting tool written in Go☆25Jan 3, 2020Updated 6 years ago
- ☆16Dec 15, 2021Updated 4 years ago
- ☆26Jul 7, 2021Updated 4 years ago
- ☆44Dec 11, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆132Mar 10, 2022Updated 4 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆59Feb 7, 2024Updated 2 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Simple HTTP listener for security testing☆21Oct 7, 2022Updated 3 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆121Sep 13, 2023Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆131Apr 6, 2022Updated 4 years ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- CTF toolbox☆23Apr 2, 2023Updated 3 years ago
- Dangerously fast DNS/network/port scanner☆922Mar 18, 2022Updated 4 years ago
- ☆14Dec 23, 2022Updated 3 years ago
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 6 years ago
- Stop Defender Service using C# via Token Impersonation☆169Jan 30, 2022Updated 4 years ago
- 🤖 The Modern Port Scanner 🤖☆23Jul 1, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Koth - TryHackMe Tricks☆191Nov 5, 2023Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization☆92Nov 18, 2018Updated 7 years ago
- Some tools based on docker☆25Jul 28, 2020Updated 5 years ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- a modern subdomains scanner☆13Jul 10, 2024Updated last year
- A simple script to automate systemd backdoor☆39Dec 19, 2022Updated 3 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A small reverse shell for Linux & Windows☆639Jun 5, 2024Updated last year
- Exploit scripts☆12Apr 10, 2022Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- Responser☆55Apr 18, 2022Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Reverse shell and rootkit☆20Apr 28, 2017Updated 8 years ago
- AbuseIPDB integration enabling automatic reporting of malicious activity detected by T-Pot honeypots by monitoring logs, analyzing attack…☆16Mar 24, 2026Updated 2 weeks ago