Nano is a family of PHP web shells which are code golfed for stealth.
☆446Feb 18, 2020Updated 6 years ago
Alternatives and similar repositories for nano
Users that are interested in nano are comparing it to the libraries listed below
Sorting:
- Cloak can backdoor any python script with some tricks.☆501May 5, 2019Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- modern javascript parser☆68Aug 17, 2025Updated 6 months ago
- Intelligent login bruteforcer.☆909Apr 27, 2023Updated 2 years ago
- A python module for dumping usable proxies.☆163Nov 13, 2019Updated 6 years ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 6 years ago
- Detect and decode encoded strings, recursively.☆923Sep 16, 2025Updated 5 months ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆450May 5, 2019Updated 6 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,318Jun 4, 2023Updated 2 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆127Oct 1, 2020Updated 5 years ago
- Reconnaissance Swiss Army Knife☆2,015Jan 26, 2021Updated 5 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Blockchain Transactions Investigation Tool☆596Jul 15, 2022Updated 3 years ago
- Crack hashes in seconds.☆1,864Dec 10, 2024Updated last year
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Nov 14, 2019Updated 6 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- DNS caching for humans☆96Dec 9, 2021Updated 4 years ago
- Google Search Scraper☆568Aug 23, 2019Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Extract endpoints from apk files.☆877Jan 7, 2022Updated 4 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- Awesome XSS stuff☆5,066Oct 30, 2024Updated last year
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- CSRF Scanner☆584Jun 28, 2024Updated last year
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,213Feb 6, 2022Updated 4 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,127Feb 10, 2021Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆837May 17, 2024Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago