Herramienta ideal para obtener una Fully Shell interactiva vía HTTP, sin necesidad de hacer Reverse Shell.
☆110Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for ttyoverhttp
Users that are interested in ttyoverhttp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various code snippets☆43Aug 24, 2019Updated 6 years ago
- Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https://…☆64Nov 3, 2019Updated 6 years ago
- Programa para gestionar WhatsApp desde terminal, ideal para robar/gestionar sesiones tras haber ganar acceso a un dispositivo móvil.☆82Nov 3, 2019Updated 6 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆161May 1, 2024Updated last year
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆103Nov 28, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Programa ideal para el Spoofing de llamadas y mensajería instantánea (SMS) desde terminal.☆169Nov 3, 2019Updated 6 years ago
- Herramienta hecha en Bash ideal para automatizar ataques WiFi (WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆429Nov 28, 2023Updated 2 years ago
- Herramienta ideal para el despliegue automatizado de un Rogue AP con capacidad de selección de plantilla + 2FA. No requiere de conexión c…☆603Sep 12, 2021Updated 4 years ago
- Página web personal. Artículos sobre ciberseguridad, CTFs e investigaciones.☆406Mar 14, 2023Updated 3 years ago
- Cliente de terminal hecho en Bash ideal para trabajar cómodamente desde consola sobre la plataforma de HackTheBox.☆266Aug 31, 2021Updated 4 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Local File Inclusion To Remote Command Execution (PoC)☆50Apr 10, 2023Updated 3 years ago
- Local File Inclusion Enumeration (PoC)☆59Jul 2, 2024Updated last year
- Fast subdomains enumeration tool for penetration testers☆30Feb 6, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Webscrapper written in python3 to show gtfobins in a terminal.☆50Apr 13, 2022Updated 4 years ago
- Buffer Overflow para SLmail5.5 32 bits☆17Dec 5, 2021Updated 4 years ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆21Dec 3, 2021Updated 4 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- MultiPlatform ArpSpoofer Written in python☆21Mar 10, 2022Updated 4 years ago
- Exploit para MiniShare1.4.1☆13Dec 2, 2021Updated 4 years ago
- ☆15Oct 1, 2020Updated 5 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆10May 4, 2023Updated 2 years ago
- Car Hacking Toolkit☆14Oct 15, 2021Updated 4 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆10Apr 6, 2023Updated 3 years ago
- Instala configuración de @s4vitar,@vowkn y @kyb3rvizsla en dos clicks 😀☆22Jan 15, 2021Updated 5 years ago
- Sencillo script que nos permite eliminar automáticamente todos los archivos duplicados de dos carpetas diferentes.☆12Apr 20, 2022Updated 4 years ago
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 12 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Reverse shell hecho en Java, donde tendremos el código correspondiente para la máquina cliente (atacante) y para el servidor (víctima)☆12Mar 13, 2024Updated 2 years ago
- Este script añade la config de s4vitar a bspwm automaticamente!☆304Mar 4, 2024Updated 2 years ago
- iptables rules to only have incoming connections from the machine on TryHackMe☆221Oct 28, 2021Updated 4 years ago
- Local File Inclusion Scanner and Exploiter☆15Dec 28, 2021Updated 4 years ago
- Automate Blind SQL Injection with Python.☆23Aug 20, 2022Updated 3 years ago
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shells☆11Oct 12, 2022Updated 3 years ago
- Python tool to bruteforce openssl ciphers against a wordilst☆31Jul 20, 2018Updated 7 years ago