Nano is a family of PHP web shells which are code golfed for stealth.
☆448Feb 18, 2020Updated 6 years ago
Alternatives and similar repositories for nano
Users that are interested in nano are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JShell - Get a JavaScript shell with XSS.☆534May 5, 2019Updated 7 years ago
- Cloak can backdoor any python script with some tricks.☆504May 5, 2019Updated 7 years ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 7 years ago
- A python module for dumping usable proxies.☆165Nov 13, 2019Updated 6 years ago
- modern javascript parser☆71Apr 22, 2026Updated 2 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Intelligent login bruteforcer.☆915Apr 27, 2023Updated 3 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆451May 5, 2019Updated 7 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 7 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆128Oct 1, 2020Updated 5 years ago
- Detect and decode encoded strings, recursively.☆930Sep 16, 2025Updated 7 months ago
- Striker is an offensive information and vulnerability scanner.☆2,334Jun 4, 2023Updated 2 years ago
- DNS caching for humans☆96Dec 9, 2021Updated 4 years ago
- Reconnaissance Swiss Army Knife☆2,042Jan 26, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆472Nov 14, 2019Updated 6 years ago
- Extract endpoints from apk files.☆876Jan 7, 2022Updated 4 years ago
- Crack hashes in seconds.☆1,885Dec 10, 2024Updated last year
- Awesome XSS stuff☆5,105Oct 30, 2024Updated last year
- HTA encryption tool for RedTeams☆1,426Nov 9, 2022Updated 3 years ago
- Blockchain Transactions Investigation Tool☆598Jul 15, 2022Updated 3 years ago
- Python / C# Unmanaged PowerShell based RAT☆775Mar 29, 2023Updated 3 years ago
- CSRF Scanner☆588Jun 28, 2024Updated last year
- Google Search Scraper☆571Aug 23, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An advanced multithreaded admin panel finder written in python.☆840May 17, 2024Updated last year
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆945May 8, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,463Nov 3, 2018Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- Malicious Macro Generator☆832Apr 17, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MSDAT: Microsoft SQL Database Attacking Tool☆996Aug 1, 2023Updated 2 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Find emails of Github users☆591May 5, 2019Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆528Apr 14, 2023Updated 3 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- Anti-Automation System☆130Mar 18, 2021Updated 5 years ago