crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX
☆215May 1, 2025Updated 10 months ago
Alternatives and similar repositories for crash
Users that are interested in crash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Nov 7, 2024Updated last year
- ICMP and DNS tunneling via IPv4 and IPv6☆228Apr 4, 2025Updated 11 months ago
- unix socket interface for C++ raw IP/IP6/UDP/TCP, Layer2 etc. framework☆43Mar 1, 2023Updated 3 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- RFC8484 and DoH/JSON resolver☆41Jul 21, 2023Updated 2 years ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- Get root via TTY / TIOCSTI stuffing☆77May 12, 2025Updated 10 months ago
- opmsg message encryption☆756Mar 2, 2023Updated 3 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆142May 27, 2025Updated 9 months ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.☆894Jun 22, 2023Updated 2 years ago
- opmsg p2p transport network☆75Jul 12, 2018Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Unofficial gnuk mirror☆19Feb 16, 2021Updated 5 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆320Mar 15, 2026Updated last week
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- QUANTUM-DNS server☆20Jul 16, 2019Updated 6 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- Host files with DNS☆32Mar 1, 2016Updated 10 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- XNU Rootkit Framework☆126Jan 3, 2015Updated 11 years ago