Reverse shell for remote administration
☆29Feb 12, 2018Updated 8 years ago
Alternatives and similar repositories for p4p1_revshell
Users that are interested in p4p1_revshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Static code injection using text padding and reverse text extension☆11Jun 7, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Reverse shell and rootkit☆20Apr 28, 2017Updated 8 years ago
- Simple C# reverse shell with shellcode and process injection☆40May 13, 2016Updated 9 years ago
- Script to tether your turtle to your laptop so that your turtle gets internet over your laptops connection instead of your laptop getting…☆14Aug 22, 2015Updated 10 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- ZeroRemote Trojan SRC Extract☆20Mar 1, 2017Updated 9 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 11 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- 暴力检测一些qq企业邮箱弱口令的用户。以提醒他们修改密码☆13Nov 25, 2015Updated 10 years ago
- Simple Arduino project to detect RF jammers for a couple of bucks☆18Aug 1, 2019Updated 6 years ago
- 大学毕业设计,远程控制工具集,包含远程命令行,远程文件管理,远程桌面,已停止维护。☆14Dec 27, 2015Updated 10 years ago
- Various Crypter Project☆55Feb 26, 2014Updated 12 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆13Sep 15, 2018Updated 7 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 8 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- WHMCS for Monero☆15Aug 9, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆29Aug 5, 2019Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- 通过 Webshell 创建 BugScan 节点(需要目标支持 Python2.7)☆15Nov 9, 2016Updated 9 years ago
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago