Multipurpose tool, currently aimed for HackTheBox Battlegrounds
☆20Nov 18, 2020Updated 5 years ago
Alternatives and similar repositories for hyder
Users that are interested in hyder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- ☆17Jan 2, 2020Updated 6 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsec☆19Feb 2, 2026Updated last month
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆70Dec 4, 2018Updated 7 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆12May 9, 2023Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated last week
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Two-factor Bitcoin (BIP38)☆36Mar 22, 2015Updated 11 years ago
- This has all of my resources advised in my youtube channel for the TMUA exam☆20Jan 7, 2025Updated last year
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 5 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆16Dec 21, 2021Updated 4 years ago
- ☆13Aug 22, 2022Updated 3 years ago
- ☆40Sep 23, 2024Updated last year
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago