Multipurpose tool, currently aimed for HackTheBox Battlegrounds
☆20Nov 18, 2020Updated 5 years ago
Alternatives and similar repositories for hyder
Users that are interested in hyder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse shell and rootkit☆20Apr 28, 2017Updated 9 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Jun 14, 2022Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆15Sep 16, 2024Updated last year
- Exploit iDRAC 7 & 8 firmware < 2.52.52.52☆18Dec 10, 2021Updated 4 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 7 months ago
- A Simple Password Protected Back Door written in Python3☆21Jul 1, 2023Updated 2 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆22Nov 9, 2023Updated 2 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 5 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated last month
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This has all of my resources advised in my youtube channel for the TMUA exam☆21Jan 7, 2025Updated last year
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆13May 9, 2023Updated 2 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 6 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Web CTF CheatSheet 🐈☆33Apr 10, 2019Updated 7 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆16Dec 21, 2021Updated 4 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- ☆13Aug 22, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆40Sep 23, 2024Updated last year
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Gmail shell, for hackers execute commands via gmail☆20Feb 3, 2021Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 7 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago
- ☆12Feb 18, 2022Updated 4 years ago