Herramienta ideal para obtener una Fully Shell interactiva vía HTTP, sin necesidad de hacer Reverse Shell.
☆108Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for ttyoverhttp
Users that are interested in ttyoverhttp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https://…☆64Nov 3, 2019Updated 6 years ago
- Programa para gestionar WhatsApp desde terminal, ideal para robar/gestionar sesiones tras haber ganar acceso a un dispositivo móvil.☆82Nov 3, 2019Updated 6 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆161May 1, 2024Updated last year
- Herramienta ideal para la inspección de transacciones en el servicio de exploración de bloques de Bitcoin.☆96Oct 26, 2022Updated 3 years ago
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆103Nov 28, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Programa ideal para el Spoofing de llamadas y mensajería instantánea (SMS) desde terminal.☆171Nov 3, 2019Updated 6 years ago
- Herramienta hecha en Bash ideal para automatizar ataques WiFi (WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆427Nov 28, 2023Updated 2 years ago
- Herramienta ideal para el despliegue automatizado de un Rogue AP con capacidad de selección de plantilla + 2FA. No requiere de conexión c…☆599Sep 12, 2021Updated 4 years ago
- Página web personal. Artículos sobre ciberseguridad, CTFs e investigaciones.☆405Mar 14, 2023Updated 3 years ago
- Cliente de terminal hecho en Bash ideal para trabajar cómodamente desde consola sobre la plataforma de HackTheBox.☆266Aug 31, 2021Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆30Feb 6, 2023Updated 3 years ago
- Webscrapper written in python3 to show gtfobins in a terminal.☆50Apr 13, 2022Updated 3 years ago
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆21Dec 3, 2021Updated 4 years ago
- MultiPlatform ArpSpoofer Written in python☆22Mar 10, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Car Hacking Toolkit☆13Oct 15, 2021Updated 4 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Linux colorful dotfiles.☆55Mar 5, 2023Updated 3 years ago
- Instala configuración de @s4vitar,@vowkn y @kyb3rvizsla en dos clicks 😀☆22Jan 15, 2021Updated 5 years ago
- Sencillo script que nos permite eliminar automáticamente todos los archivos duplicados de dos carpetas diferentes.☆12Apr 20, 2022Updated 3 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Script hecho en bash para realizar ataque de fuerza bruta contra el fichero xmlrpc.php de WordPress☆13May 5, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Este script añade la config de s4vitar a bspwm automaticamente!☆304Mar 4, 2024Updated 2 years ago
- Reverse shell hecho en Java, donde tendremos el código correspondiente para la máquina cliente (atacante) y para el servidor (víctima)☆12Mar 13, 2024Updated 2 years ago
- Escaner de los puertos internos de un host.☆16Mar 3, 2024Updated 2 years ago
- Local File Inclusion Scanner and Exploiter☆15Dec 28, 2021Updated 4 years ago
- iptables rules to only have incoming connections from the machine on TryHackMe☆220Oct 28, 2021Updated 4 years ago
- Automate Blind SQL Injection with Python.☆23Aug 20, 2022Updated 3 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python tool to bruteforce openssl ciphers against a wordilst☆31Jul 20, 2018Updated 7 years ago
- A cheatsheet and mindmap for CRTO certification☆16Mar 22, 2023Updated 3 years ago
- ☆298Oct 15, 2025Updated 5 months ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Apr 3, 2026Updated last week
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Nov 29, 2022Updated 3 years ago
- A simple PHP application to learn SQL Injection detection and exploitation techniques.☆127Oct 18, 2022Updated 3 years ago
- Easy Python virus framework☆12Nov 13, 2021Updated 4 years ago