Modular reverse shell server with a Discord frontend and example payloads
☆28May 5, 2020Updated 5 years ago
Alternatives and similar repositories for shellman
Users that are interested in shellman are comparing it to the libraries listed below
Sorting:
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Mar 3, 2020Updated 6 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆35Feb 1, 2021Updated 5 years ago
- CTF (Capture The Flag) writeups, code snippets, notes, scripts☆14Dec 28, 2019Updated 6 years ago
- Markov Model libraries, optimized for cracking-focused password generations.☆112Jul 8, 2021Updated 4 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Aug 27, 2023Updated 2 years ago
- frida snippet generator firefox extension for developer.android.com☆23Mar 2, 2022Updated 4 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Jul 29, 2023Updated 2 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- A driver to implement IOCTL hooking☆27Mar 17, 2022Updated 4 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- QC: Quantum Computing Simulator for C☆12Apr 8, 2024Updated last year
- ☆19Mar 31, 2022Updated 3 years ago
- None of the exploit code or research is my own but all available in public domain☆26Jun 9, 2019Updated 6 years ago
- Programlamanın Temeli Algoritma Dersleri☆17Jan 18, 2020Updated 6 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 6 years ago
- Fastest HTTP parser in the west. Utilizes SIMD vectorization, supports streaming and never allocates. Powered by Zig ⚡☆30Oct 24, 2025Updated 4 months ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- ☆36Jan 22, 2025Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Encrypt jekyll-posts with AES☆24Apr 7, 2020Updated 5 years ago
- KPI Reporter is a dev-friendly, on-premises tool for crafting automated reports on what matters to you.☆10Oct 6, 2022Updated 3 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- System Design - An Overview☆35Jan 19, 2021Updated 5 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- IIS PUT WebDAV GetShell Exploit☆18Aug 15, 2020Updated 5 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- ☆10Oct 20, 2025Updated 5 months ago