kokatesaurabh / reverse-shellLinks
Python RAT: A simple Remote Access Trojan with a server (server.py) and client (rat.py). The server sends commands to clients and receives their outputs. For educational use only. Unauthorized use is illegal.
☆11Updated last year
Alternatives and similar repositories for reverse-shell
Users that are interested in reverse-shell are comparing it to the libraries listed below
Sorting:
- Venbluez : record audio from bluetooth devices like speaker, headphone and earbuds☆11Updated 9 months ago
- MALWARE-101==>> is a comprehensive guide to malware development. Covering basics to advanced techniques, we’ll explore malware types, bui…☆26Updated 3 months ago
- Cyber-Jarvis is a versatile AI assistant for automation and cybersecurity. It handles tasks like playing videos, detecting objects, perfo…☆16Updated 5 months ago
- it content free resources including courses that help you to learn ethical hacking for beginners to advanced☆59Updated 3 years ago
- Passlord is a smart tool that creates lists of possible passwords using clever methods.☆32Updated 5 months ago
- Hound is a simple and light tool for information gathering and capture exact GPS coordinates☆706Updated last year
- OnionHost allows you to host dark web sites using Termux or Linux, keeping everything on your local server for secure, self-hosted privac…☆11Updated 11 months ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆414Updated last year
- List of websites to practice and learn hacking legally☆94Updated 7 years ago
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆510Updated last month
- Ethical Hacking Tutorials , Pentesting Resources☆75Updated 7 years ago
- Hello, aspiring hackers! 🕵️♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absol…☆317Updated 5 months ago
- It is a advanced keylogger.☆73Updated last year
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆93Updated 2 years ago
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆746Updated this week
- File System Integrity checker (etc)☆33Updated 8 years ago
- ☆48Updated 7 months ago
- Basic tool for Information Gathering 🚀☆23Updated last year
- ☆265Updated 3 months ago
- ☆13Updated last year
- Obfuscated Pegasus Spyware.☆35Updated last year
- A curated list of 20 free hacking books that cover various aspects of cybersecurity, ethical hacking, and penetration testing. This repos…☆32Updated last month
- Customize Your Terminal with Powerlevel10k and Zsh for an Enhanced Experience☆15Updated last year
- ⚡ A powerful Python-based WiFi brute-force tool for ethical hacking and wireless security testing. ✅ No monitor mode or packet injection …☆28Updated 7 months ago
- Best Bug Bounty Roadmap for 2026☆59Updated 3 weeks ago
- ☆18Updated 9 months ago
- recon for bug hunters☆860Updated 2 months ago
- This is a repository for all the writeups of CTFs organized by us.☆19Updated 11 months ago
- ☆40Updated last month
- PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first…☆17Updated 3 months ago