☆44Dec 11, 2022Updated 3 years ago
Alternatives and similar repositories for icmp_reverse_shell
Users that are interested in icmp_reverse_shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 8 months ago
- A simple script to automate systemd backdoor☆39Dec 19, 2022Updated 3 years ago
- This is a mini ransomware made with python o/☆13Oct 6, 2021Updated 4 years ago
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated 11 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- Tor VPN☆29Feb 25, 2026Updated 3 weeks ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Jan 1, 2024Updated 2 years ago
- ☆15Dec 27, 2022Updated 3 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆116Sep 29, 2023Updated 2 years ago
- Random stuff I write for no specific reason.☆48Updated this week
- ☆80Feb 4, 2026Updated last month
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Apr 18, 2023Updated 2 years ago
- ☆94May 14, 2022Updated 3 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Finding XSS during recon☆272Sep 13, 2022Updated 3 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- shell over icmp☆34May 18, 2013Updated 12 years ago
- Aline dork Automator☆31Jan 25, 2022Updated 4 years ago
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year