Herramienta ideal para obtener una Fully Shell interactiva vía HTTP, sin necesidad de hacer Reverse Shell.
☆108Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for ttyoverhttp
Users that are interested in ttyoverhttp are comparing it to the libraries listed below
Sorting:
- Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https://…☆64Nov 3, 2019Updated 6 years ago
- Programa para gestionar WhatsApp desde terminal, ideal para robar/gestionar sesiones tras haber ganar acceso a un dispositivo móvil.☆82Nov 3, 2019Updated 6 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆161May 1, 2024Updated last year
- Herramienta ideal para la inspección de transacciones en el servicio de exploración de bloques de Bitcoin.☆96Oct 26, 2022Updated 3 years ago
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆103Nov 28, 2023Updated 2 years ago
- Programa ideal para el Spoofing de llamadas y mensajería instantánea (SMS) desde terminal.☆171Nov 3, 2019Updated 6 years ago
- Herramienta hecha en Bash ideal para automatizar ataques WiFi (WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆426Nov 28, 2023Updated 2 years ago
- Herramienta ideal para el despliegue automatizado de un Rogue AP con capacidad de selección de plantilla + 2FA. No requiere de conexión c…☆596Sep 12, 2021Updated 4 years ago
- Página web personal. Artículos sobre ciberseguridad, CTFs e investigaciones.☆403Mar 14, 2023Updated 3 years ago
- Cliente de terminal hecho en Bash ideal para trabajar cómodamente desde consola sobre la plataforma de HackTheBox.☆266Aug 31, 2021Updated 4 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Local File Inclusion To Remote Command Execution (PoC)☆51Apr 10, 2023Updated 2 years ago
- Local File Inclusion Enumeration (PoC)☆61Jul 2, 2024Updated last year
- Fast subdomains enumeration tool for penetration testers☆30Feb 6, 2023Updated 3 years ago
- Buffer Overflow para SLmail5.5 32 bits☆17Dec 5, 2021Updated 4 years ago
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆20Dec 3, 2021Updated 4 years ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- MultiPlatform ArpSpoofer Written in python☆22Mar 10, 2022Updated 4 years ago
- Exploit para MiniShare1.4.1☆13Dec 2, 2021Updated 4 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Car Hacking Toolkit☆13Oct 15, 2021Updated 4 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Linux colorful dotfiles.☆55Mar 5, 2023Updated 3 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- Instala configuración de @s4vitar,@vowkn y @kyb3rvizsla en dos clicks 😀☆22Jan 15, 2021Updated 5 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- Este script añade la config de s4vitar a bspwm automaticamente!☆304Mar 4, 2024Updated 2 years ago
- Reverse shell hecho en Java, donde tendremos el código correspondiente para la máquina cliente (atacante) y para el servidor (víctima)☆12Mar 13, 2024Updated 2 years ago
- Escaner de los puertos internos de un host.☆16Mar 3, 2024Updated 2 years ago
- Local File Inclusion Scanner and Exploiter☆15Dec 28, 2021Updated 4 years ago
- Automate Blind SQL Injection with Python.☆23Aug 20, 2022Updated 3 years ago
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shells☆12Oct 12, 2022Updated 3 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- Single header library to simplify the usage of direct syscalls. x64/x86☆14Feb 26, 2023Updated 3 years ago
- Python tool to bruteforce openssl ciphers against a wordilst☆31Jul 20, 2018Updated 7 years ago