git5loxosec / rMETAshell
rMETAshell takes a shell command and an image, video or text file as input. It then injects the command into the file using metadata comments. After injection, it generates a one-liner execution method for retrieving and executing the injected command from a remote location.
☆24Updated 11 months ago
Alternatives and similar repositories for rMETAshell:
Users that are interested in rMETAshell are comparing it to the libraries listed below
- Make a Fake wireless access point aka Evil Twin....Easily!!☆65Updated last year
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆30Updated 3 years ago
- Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks☆62Updated 2 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆28Updated 5 years ago
- Android-PIN-Bruteforce☆16Updated 3 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆33Updated last month
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆35Updated 3 years ago
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆36Updated 2 years ago
- A good tool to hide phishing traps or cut links.☆34Updated last year
- List of RAT's For android. To get any support on them contact t.me/efxtv☆40Updated 3 weeks ago
- This tool send a malicious messages to target which causes WhatsApp to crash☆35Updated last year
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆34Updated 5 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- Wordlist creator written in C to generate all possibilities of passwords☆19Updated 6 years ago
- Herramienta dirigida exclusivamente al uso de Fuerza Bruta y Ataques de Diccionario a varios tipos de Objetivos. [NO ME HAGO RESPONSABLE …☆41Updated last year
- A Powerful DDoS Tool For making Any Service DOWN, Also Included Proxies and Socks for Anonymization☆52Updated last year
- DarkScan automate all the NMAP scans☆36Updated 2 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆39Updated 2 years ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆44Updated 3 months ago
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆22Updated 3 months ago
- People Profiler (fake script)☆20Updated 3 months ago
- Simple script to bulk check if IPs match networks☆11Updated 3 years ago
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆20Updated this week
- Cracking protocols FTP and SSH.☆9Updated 5 months ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆72Updated 2 weeks ago
- Bin Credit card Checker using python☆33Updated 3 years ago
- XDROID is android all in one hack tools☆33Updated 5 months ago
- A very user friendly and advanced phishing toolkit made for hackers☆26Updated 3 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆37Updated last year