Python 3 Reverse Shell
☆26Jan 2, 2022Updated 4 years ago
Alternatives and similar repositories for shell
Users that are interested in shell are comparing it to the libraries listed below
Sorting:
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Reverse Shell with Python 3☆26Dec 25, 2020Updated 5 years ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- Just lists of lists of lists !☆17Oct 13, 2025Updated 5 months ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 2 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- Bots for our fun lil IRC chatroom☆15Oct 25, 2023Updated 2 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- ☆19Dec 4, 2025Updated 3 months ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Mar 2, 2020Updated 6 years ago
- OG Atomic Red Team☆30Jun 12, 2018Updated 7 years ago
- ☆11Jan 8, 2020Updated 6 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- Automated man-in-the-middle attack tool.☆52Sep 4, 2014Updated 11 years ago
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 7 months ago
- Fake-sms☆27Jun 21, 2025Updated 8 months ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 4 months ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated last week
- Bash scripts that help you audit the system administration on a Linux server☆11Jun 26, 2017Updated 8 years ago
- Scripts, POCs & bullshit☆31May 29, 2025Updated 9 months ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Mar 22, 2023Updated 2 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Docker gunicorn server base image source☆11Oct 12, 2014Updated 11 years ago
- ☆13Nov 17, 2021Updated 4 years ago