root4031 / reverse-shellsLinks
This tool will help in generating reverse shells easily for all types of OS.
☆20Updated 2 years ago
Alternatives and similar repositories for reverse-shells
Users that are interested in reverse-shells are comparing it to the libraries listed below
Sorting:
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆26Updated 3 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆10Updated 3 years ago
- PHP lab to test captcha bypassing☆30Updated last year
- A small tool to find admin panel of the website☆17Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated 2 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆19Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Repository of tools used in my blog☆52Updated last year
- Automating the SQL Injection through Google dorks.☆26Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 weeks ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated 2 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆11Updated 2 years ago
- Anubis 7.0☆27Updated last year
- Collect XSS vulnerable parameters from entire domain.☆13Updated 3 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆21Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago