s0md3v / nanoView external linksLinks
Nano is a family of PHP web shells which are code golfed for stealth.
☆449Feb 18, 2020Updated 5 years ago
Alternatives and similar repositories for nano
Users that are interested in nano are comparing it to the libraries listed below
Sorting:
- Cloak can backdoor any python script with some tricks.☆501May 5, 2019Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- modern javascript parser☆67Aug 17, 2025Updated 5 months ago
- Intelligent login bruteforcer.☆906Apr 27, 2023Updated 2 years ago
- A python module for dumping usable proxies.☆163Nov 13, 2019Updated 6 years ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 6 years ago
- Detect and decode encoded strings, recursively.☆920Sep 16, 2025Updated 4 months ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆449May 5, 2019Updated 6 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆127Oct 1, 2020Updated 5 years ago
- Reconnaissance Swiss Army Knife☆2,005Jan 26, 2021Updated 5 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Blockchain Transactions Investigation Tool☆592Jul 15, 2022Updated 3 years ago
- Crack hashes in seconds.☆1,860Dec 10, 2024Updated last year
- Malicious Macro Generator☆831Apr 17, 2019Updated 6 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago
- DNS caching for humans☆96Dec 9, 2021Updated 4 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- Google Search Scraper☆571Aug 23, 2019Updated 6 years ago
- Extract endpoints from apk files.☆876Jan 7, 2022Updated 4 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,130Dec 7, 2022Updated 3 years ago
- Awesome XSS stuff☆5,054Oct 30, 2024Updated last year
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Jul 11, 2017Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- CSRF Scanner☆584Jun 28, 2024Updated last year
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,209Feb 6, 2022Updated 4 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,131Feb 10, 2021Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆837May 17, 2024Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago