Nano is a family of PHP web shells which are code golfed for stealth.
☆448Feb 18, 2020Updated 6 years ago
Alternatives and similar repositories for nano
Users that are interested in nano are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JShell - Get a JavaScript shell with XSS.☆534May 5, 2019Updated 6 years ago
- Cloak can backdoor any python script with some tricks.☆504May 5, 2019Updated 6 years ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 6 years ago
- A python module for dumping usable proxies.☆165Nov 13, 2019Updated 6 years ago
- modern javascript parser☆70Aug 17, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Intelligent login bruteforcer.☆914Apr 27, 2023Updated 2 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆452May 5, 2019Updated 6 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆128Oct 1, 2020Updated 5 years ago
- Detect and decode encoded strings, recursively.☆926Sep 16, 2025Updated 7 months ago
- Striker is an offensive information and vulnerability scanner.☆2,327Jun 4, 2023Updated 2 years ago
- DNS caching for humans☆96Dec 9, 2021Updated 4 years ago
- Reconnaissance Swiss Army Knife☆2,029Jan 26, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆472Nov 14, 2019Updated 6 years ago
- Extract endpoints from apk files.☆875Jan 7, 2022Updated 4 years ago
- Crack hashes in seconds.☆1,874Dec 10, 2024Updated last year
- Awesome XSS stuff☆5,097Oct 30, 2024Updated last year
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Blockchain Transactions Investigation Tool☆596Jul 15, 2022Updated 3 years ago
- Python / C# Unmanaged PowerShell based RAT☆774Mar 29, 2023Updated 3 years ago
- Google Search Scraper☆570Aug 23, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CSRF Scanner☆587Jun 28, 2024Updated last year
- An advanced multithreaded admin panel finder written in python.☆838May 17, 2024Updated last year
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆993Aug 1, 2023Updated 2 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Malicious Macro Generator☆831Apr 17, 2019Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Find emails of Github users☆589May 5, 2019Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 3 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago