List of payloads: reverse shell, bind shell, webshell.
☆17Feb 26, 2022Updated 4 years ago
Alternatives and similar repositories for Shells
Users that are interested in Shells are comparing it to the libraries listed below
Sorting:
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…☆11Jun 27, 2021Updated 4 years ago
- It's an open source restaurant and coffee shop management system.☆10Jan 6, 2023Updated 3 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Best Tool for Increase Instagram Follower. ( recoding of insfollow to bypass the ban)☆10Nov 11, 2022Updated 3 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 5 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆45Oct 29, 2023Updated 2 years ago
- Awesome Pentest Reports☆19Jun 16, 2023Updated 2 years ago
- Bangla TTS Inference pipeline using Vit TTS☆13Mar 24, 2024Updated last year
- ☆67Jul 12, 2025Updated 8 months ago
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- Micro-agent framework for Caido☆29Sep 4, 2025Updated 6 months ago
- Simple intermediate representation language for learning and research.☆20Mar 27, 2020Updated 5 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆19Dec 3, 2020Updated 5 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13May 4, 2022Updated 3 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated 2 months ago
- Your favourite chest/terminal bursting buddy!☆18Nov 27, 2021Updated 4 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- jackson-databind-exploit☆13Mar 22, 2019Updated 6 years ago
- Android Protection Bypass Stuff that I compiled from few resources.☆25Dec 10, 2022Updated 3 years ago
- All Cryptography Algorithms are implemented in C.☆13Mar 28, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- Use these VDP in Bug Hunting, These VDP are checked and verified by Bug Hunters☆20Aug 9, 2022Updated 3 years ago
- tiktok tools | scrapping | automation☆31Nov 10, 2025Updated 4 months ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- Aptos Keyless ZK circuit implementation in circom, together with a Rust-based ZK proving service☆21Mar 14, 2026Updated last week
- A set of scripts to facilitate HTTP interception on mobile apps☆20Mar 11, 2026Updated last week
- My backdoor script for a vulnerable version of UnrealIRCd☆25Apr 29, 2024Updated last year
- Here you can find mostly all disclosed h1 reports☆18Apr 4, 2019Updated 6 years ago
- This repo stores something about reverse engineering technique fundemental☆16Jan 16, 2023Updated 3 years ago
- ☆14May 9, 2023Updated 2 years ago
- ☆26Apr 30, 2020Updated 5 years ago
- Transition form local file inclusion attacks to remote code exection☆68Aug 26, 2020Updated 5 years ago