Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back Connect, Bind Shell, Back Connect, Auto Rooter etc.
☆15Jul 4, 2017Updated 8 years ago
Alternatives and similar repositories for Attack-Shell
Users that are interested in Attack-Shell are comparing it to the libraries listed below
Sorting:
- ☆10Oct 22, 2017Updated 8 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- A simple anti-spoofing DNS server☆23Nov 23, 2016Updated 9 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- USB Attack Development Platform☆34May 19, 2018Updated 7 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆31Sep 15, 2016Updated 9 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- app lock android project☆16May 31, 2013Updated 12 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- RAT / Botnet Simulator for pentest / education☆83Aug 2, 2019Updated 6 years ago
- Z-Wave Packet Interception and Injection Tool☆36Nov 4, 2015Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Feb 21, 2021Updated 5 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- The web gui for the OpenBSD pf firewall☆16Feb 9, 2010Updated 16 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- ☆43Jan 2, 2023Updated 3 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Scoring Engine for CTF competitions☆48Feb 15, 2023Updated 3 years ago