An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is il…
☆226Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for PwnLnX
Users that are interested in PwnLnX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Apr 4, 2022Updated 4 years ago
- This repository will contain python scripts for hackers and pentesters☆25Mar 11, 2022Updated 4 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- ☆18May 31, 2023Updated 2 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hide your payload in DNS☆613May 3, 2023Updated 2 years ago
- OSCP Privilege Escalation MindMap/Guide☆199Apr 4, 2022Updated 4 years ago
- ☆21Mar 12, 2022Updated 4 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆331Jul 1, 2024Updated last year
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Sep 15, 2022Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆193Jul 4, 2024Updated last year
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- macOS persistence tool☆228Feb 9, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- Extend wordlist by appending digits and special characters to each word.☆11Apr 26, 2023Updated 2 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Hello, Attack Surface Scan, BurpSuite完全被动扫描插件,不主动发送任何请求,适合挂机使用。☆24Jul 10, 2022Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- xss vulnerability scanner and input fuzzing tool.☆59Apr 8, 2023Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Nov 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆319May 29, 2022Updated 3 years ago
- Fast browser-based network discovery module☆115May 26, 2021Updated 4 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Apr 1, 2026Updated 2 weeks ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆418Sep 8, 2025Updated 7 months ago
- A python tool to check subdomain takeover vulnerability☆344Jan 6, 2023Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- ☆15May 22, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Linux x86_64 Process Injection Utility☆59Mar 9, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A ddos tool for penetration of websites☆15Dec 13, 2020Updated 5 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Simple executable generator with encrypted shellcode.☆281Oct 3, 2022Updated 3 years ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆684Jul 15, 2024Updated last year
- the only php webshell you need.☆230Mar 18, 2025Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 6 months ago