git5loxosec / rMETAshellLinks
rMETAshell takes a shell command and an image, video or text file as input. It then injects the command into the file using metadata comments. After injection, it generates a one-liner execution method for retrieving and executing the injected command from a remote location.
☆26Updated last year
Alternatives and similar repositories for rMETAshell
Users that are interested in rMETAshell are comparing it to the libraries listed below
Sorting:
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆84Updated 2 years ago
- Herramienta dirigida exclusivamente al uso de Fuerza Bruta y Ataques de Diccionario a varios tipos de Objetivos. [NO ME HAGO RESPONSABLE …☆47Updated last year
- List of RAT's For android. To get any support on them contact t.me/efxtv☆47Updated last week
- A Linux shell tool that has multiple tools such as, Instagram Scraper, Phisher, Network Scanner, Port Scanner, Packet Sniffer, Web Scrape…☆20Updated 2 years ago
- Automated Wireless Attack Framework☆75Updated 6 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆74Updated 2 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆31Updated 3 months ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆70Updated 2 years ago
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆27Updated last year
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- Find exploits in local and online database☆76Updated 8 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆36Updated 4 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Updated 5 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- automate wifi hacking with wicker☆57Updated last year
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆39Updated 2 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆58Updated 2 months ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Updated 3 weeks ago
- This is a website penetration testing tool for testing webdav server vulnerabilities.☆40Updated 6 months ago
- Automatically clone websites and patch them with PHP to create phishing pages☆58Updated 3 weeks ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 11 months ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆46Updated 2 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆48Updated last year
- Nmap & SQL injection automation tool☆35Updated 8 months ago
- Cracking protocols FTP and SSH.☆12Updated 10 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web applicatio…☆24Updated last month
- A tool for automatically change the Tor IP address over time.☆88Updated 2 months ago