Reverse Shell troll software
☆12Sep 24, 2019Updated 6 years ago
Alternatives and similar repositories for reversetroll
Users that are interested in reversetroll are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Writes a custom message to your master boot record, inspired by XKCD☆16Apr 9, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wordpress Plugins List☆26Jun 17, 2019Updated 6 years ago
- ☆18Jun 12, 2025Updated 10 months ago
- custom nuclei templates☆14Sep 27, 2022Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Onacut is web application that notifies users of electricity, water or internet outage in their location☆14Apr 1, 2023Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 5 years ago
- ☆17Mar 11, 2024Updated 2 years ago
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 3 years ago
- ☆11Dec 27, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- XSS Payloads☆49Feb 2, 2016Updated 10 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- A simple blog on React JS☆11Jan 28, 2025Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 10 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 3 years ago
- ☆12Feb 20, 2025Updated last year
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated 3 weeks ago
- API for Asset Service☆14Aug 15, 2024Updated last year
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- ☆15Mar 21, 2025Updated last year
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆33Jan 31, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Showcase the books you have read.☆10Oct 2, 2017Updated 8 years ago
- 🌍 My website☆10Nov 23, 2025Updated 5 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 8 years ago
- Runs sshd as a unprivileged user for persistence☆10Jun 23, 2019Updated 6 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- ☆13Jun 26, 2021Updated 4 years ago