Finally, reverse/bind shells written in python, encrypted with ssl!
☆11Dec 20, 2015Updated 10 years ago
Alternatives and similar repositories for pysslShells
Users that are interested in pysslShells are comparing it to the libraries listed below
Sorting:
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- ☆18Jul 30, 2018Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- ☆14Jun 7, 2018Updated 7 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Jun 20, 2016Updated 9 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- Java every minor versions.☆74Apr 19, 2023Updated 2 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- ☆20May 20, 2019Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- ☆18Aug 2, 2018Updated 7 years ago
- Machine Learning for Cyber Security☆27Sep 1, 2017Updated 8 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- ☆74Aug 20, 2018Updated 7 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- oracle 10g sys权限通过java执行命令获得一个非交互shell的客户端,通常用于正向连接☆39Jan 4, 2017Updated 9 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- ICO Source Spider, write in NodeJS☆12May 4, 2018Updated 7 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- ☆82Apr 20, 2021Updated 4 years ago
- Pure-Perl OpenPGP implementation☆18Jul 28, 2017Updated 8 years ago
- A xss target for practicing☆10Feb 22, 2017Updated 9 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆71May 6, 2019Updated 6 years ago
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 12 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- ☆30Apr 10, 2019Updated 6 years ago