machine1337 / reverse-shells
This tool will help in generating reverse shells easily for all types of OS.
☆19Updated last year
Alternatives and similar repositories for reverse-shells:
Users that are interested in reverse-shells are comparing it to the libraries listed below
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated last month
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆7Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- This tool can generate various types of dropper to hide your main payload☆7Updated 2 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- A Simple Script For SSH BruteForce☆36Updated last year
- 「🚪」The hidden hookless backdoor☆12Updated 4 months ago
- A small tool to find admin panel of the website☆14Updated 2 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆18Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 4 years ago
- ShellC0de Generator☆11Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- Come on a tool to decode "MD5" + "Sha1" + "Sha256" even if it is very difficult☆12Updated 2 years ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆11Updated last year
- my mini collection of exploits and scripts for pentest☆11Updated 2 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- web based c2 🏴☠️☆13Updated 8 months ago