🀄️ WebShell Backdoor Framework
☆16Jun 7, 2018Updated 7 years ago
Alternatives and similar repositories for Shuffle
Users that are interested in Shuffle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jul 31, 2017Updated 8 years ago
- ☆27Aug 19, 2015Updated 10 years ago
- polymorphic webshells☆30Oct 20, 2017Updated 8 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Sep 30, 2017Updated 8 years ago
- Ruby implementation of Transbank's Webpay protocol☆68Aug 30, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- ☆11Jul 2, 2016Updated 9 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- Automatic ROP chain generator☆12Mar 29, 2015Updated 11 years ago
- 一个sflow的collector,用于zabbix获取从sflow收集的数据并提供自定义监控脚本。☆10Jul 15, 2015Updated 10 years ago
- Override factory brightness settings with ROOT Access [Android]☆14May 15, 2023Updated 2 years ago
- my blog && a quick solution for personal blog with github pages☆10Oct 20, 2022Updated 3 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Rack middleware for logging raw HTTP requests & responses☆11Oct 1, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- latest version-无需Python环境的Sqlmap及制作方法☆11Jul 18, 2016Updated 9 years ago
- A code security platform based on fortify sca windows☆15Mar 6, 2019Updated 7 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- Ruby implementation of Global Vectors for Word Representation☆16Apr 4, 2015Updated 10 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- 通过调用zoomeye来获取安装JBoss机器的地址 ,然后通过HEAD请求植入webshell。 wxPython写了一个界面的控制程序。☆12Mar 28, 2018Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Docker container to send traffic for dev/troubleshooting to another container in docker using TCPREPLAY☆15Mar 24, 2016Updated 10 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple webshell in Go.☆15Aug 31, 2020Updated 5 years ago
- Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para real…☆22Mar 14, 2018Updated 8 years ago
- A JIRA plugin for Lita☆15Sep 10, 2019Updated 6 years ago
- A shell for new Go webapps☆19Dec 23, 2012Updated 13 years ago
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 9 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- 🚗 Nissan Consult/OBDII Realtime Dashboard☆53Jan 5, 2023Updated 3 years ago
- Steal user's password when running sudo for post-exploitation purposes☆44Sep 29, 2020Updated 5 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- webshell收集与整理☆11Dec 30, 2015Updated 10 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- A small and fast library for manipulating Java bytecode.☆15Mar 20, 2026Updated last week
- A working VIM setup for maintaining Snort configuration files.☆14Nov 2, 2015Updated 10 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Repo for serverless lambdas☆15Apr 9, 2018Updated 7 years ago