slemire / reversetrollView external linksLinks
Reverse Shell troll software
☆12Sep 24, 2019Updated 6 years ago
Alternatives and similar repositories for reversetroll
Users that are interested in reversetroll are comparing it to the libraries listed below
Sorting:
- custom nuclei templates☆14Sep 27, 2022Updated 3 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- ☆17Jun 12, 2025Updated 8 months ago
- Our team's CTF writeups☆12Jan 15, 2020Updated 6 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Writes a custom message to your master boot record, inspired by XKCD☆16Apr 9, 2015Updated 10 years ago
- ☆16Mar 11, 2024Updated last year
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- Wordpress Plugins List☆23Jun 17, 2019Updated 6 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 3 years ago
- XSS Payloads☆49Feb 2, 2016Updated 10 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- ☆32May 16, 2018Updated 7 years ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- ☆15Mar 21, 2025Updated 10 months ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 6 months ago
- Deauther Project can be used to: Disconnect Devices from Networks, and Clone Networks☆38Aug 21, 2022Updated 3 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 5 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- Fitness OSINT Resources☆15Jul 21, 2023Updated 2 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 4 months ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- ☆12Nov 23, 2025Updated 2 months ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 4 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆42Jul 8, 2020Updated 5 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- ☆11Oct 19, 2018Updated 7 years ago