thatstraw / PwnLnX
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is il…
☆227Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for PwnLnX
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆361Updated 2 years ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆157Updated 3 years ago
- fully automated pentesting tool☆504Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆223Updated 3 months ago
- Fast Modular Web Interfaces Bruteforcer☆214Updated 3 years ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆425Updated 4 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆396Updated 10 months ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆89Updated 4 years ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆201Updated 3 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- A web hacking toolkit (docker image).☆163Updated last year
- Hide your payload into .jpg file☆383Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆77Updated 2 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆284Updated last week
- Web Application Vulnerability Scanner☆121Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆230Updated 4 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆225Updated 3 years ago
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆284Updated 6 months ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆388Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 5 months ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆482Updated 8 months ago
- A tool for generating reverse shell payloads on the fly.☆139Updated 2 years ago
- A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.☆240Updated last year
- Perform Google Dork search with Dorkify☆197Updated 2 years ago
- Perform automated network reconnaissance scans☆220Updated last year
- ☆409Updated last year