Modular reverse shell server with a Discord frontend and example payloads
☆28May 5, 2020Updated 5 years ago
Alternatives and similar repositories for shellman
Users that are interested in shellman are comparing it to the libraries listed below
Sorting:
- Our team's CTF writeups☆12Jan 15, 2020Updated 6 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Mar 3, 2020Updated 5 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆35Feb 1, 2021Updated 5 years ago
- Programlamanın Temeli Algoritma Dersleri☆17Jan 18, 2020Updated 6 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Aug 27, 2023Updated 2 years ago
- CTF (Capture The Flag) writeups, code snippets, notes, scripts☆14Dec 28, 2019Updated 6 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- vim, xmonad, xmobar, bashrc, bash profile and inits☆18Apr 7, 2023Updated 2 years ago
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 5 years ago
- frida snippet generator firefox extension for developer.android.com☆23Mar 2, 2022Updated 3 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Jul 29, 2023Updated 2 years ago
- Markov Model libraries, optimized for cracking-focused password generations.☆111Jul 8, 2021Updated 4 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- System Design - An Overview☆33Jan 19, 2021Updated 5 years ago
- None of the exploit code or research is my own but all available in public domain☆26Jun 9, 2019Updated 6 years ago
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- ☆44Sep 25, 2025Updated 5 months ago
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- stmctf22☆35Nov 16, 2022Updated 3 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Original themes, and theme edits for other themes☆10Jul 16, 2020Updated 5 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- A Android program help you learn English.☆13Mar 18, 2024Updated last year
- ☆11Jun 22, 2020Updated 5 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Primitives function for ray marching in Open GL☆10Nov 23, 2016Updated 9 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Passwordless RDP Session Hijacking☆71Aug 28, 2021Updated 4 years ago
- Newlib port for Switch☆11Sep 19, 2018Updated 7 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- ☆10Oct 20, 2025Updated 4 months ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- Remot Desktop Checker (Au3-Source)☆10Jun 25, 2018Updated 7 years ago