Extension spoofer and reverse shell generator
☆11Apr 18, 2020Updated 5 years ago
Alternatives and similar repositories for lizard
Users that are interested in lizard are comparing it to the libraries listed below
Sorting:
- OpenCATS <= 0.9.4 RCE (CVE-2021-41560)☆11Dec 10, 2021Updated 4 years ago
- Easy Port Scanner with Python☆14Dec 3, 2021Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- Local File Inclusion Scanner and Exploiter☆15Dec 28, 2021Updated 4 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- ALL IN ONE Hacking Tool For Hackers☆24Feb 8, 2021Updated 5 years ago
- ☆10Apr 27, 2024Updated last year
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Auxile Framework☆28Oct 1, 2020Updated 5 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- Memberi Akses root di termux Supaya bisa menjalankan sc root :)☆12May 17, 2020Updated 5 years ago
- ☆37Nov 6, 2020Updated 5 years ago
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- Install a MHS35 LCD on 64bit RaspberryOS☆12May 19, 2021Updated 4 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- An open-source alternative to Grabify for IP Logging and web traffic analysis.☆11Jan 28, 2026Updated last month
- Brute force your iOS Restrictions Passcode from the key & salt☆15Aug 27, 2019Updated 6 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Run command as root without password☆12Jul 20, 2022Updated 3 years ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- Utilize IBM Cloud Functions with OAuth 2.0 to enable authentication and authorization☆11Feb 14, 2022Updated 4 years ago
- ☆14Jan 31, 2026Updated last month
- ☆11Feb 16, 2024Updated 2 years ago
- 🔐 HIROO is an FUD Remote Administration Tool (RAT) Generator☆16Aug 14, 2019Updated 6 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- ☆12Dec 6, 2024Updated last year
- ☆14Updated this week
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- iDevice Exploit Injector☆13Apr 26, 2011Updated 14 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- drone_security☆14Jun 18, 2021Updated 4 years ago