Reverse Shell troll software
☆12Sep 24, 2019Updated 6 years ago
Alternatives and similar repositories for reversetroll
Users that are interested in reversetroll are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Wordpress Plugins List☆24Jun 17, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Writes a custom message to your master boot record, inspired by XKCD☆16Apr 9, 2015Updated 10 years ago
- ☆18Jun 12, 2025Updated 9 months ago
- custom nuclei templates☆14Sep 27, 2022Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Onacut is web application that notifies users of electricity, water or internet outage in their location☆14Apr 1, 2023Updated 2 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 4 years ago
- ☆16Mar 11, 2024Updated 2 years ago
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 3 years ago
- ☆11Dec 27, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- XSS Payloads☆49Feb 2, 2016Updated 10 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- A simple blog on React JS☆11Jan 28, 2025Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- ☆12Feb 20, 2025Updated last year
- Search Termux Commands and Guide in Termux !!☆11Apr 29, 2022Updated 3 years ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- ☆15Mar 21, 2025Updated last year
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Showcase the books you have read.☆10Oct 2, 2017Updated 8 years ago
- 🌍 My website☆10Nov 23, 2025Updated 4 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- ☆13Jun 26, 2021Updated 4 years ago