Basic script to generate reverse shell payloads, generally most used in ctf.
☆27Mar 20, 2024Updated 2 years ago
Alternatives and similar repositories for Rev-Shell
Users that are interested in Rev-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Digispark scripts☆15Feb 3, 2025Updated last year
- ☆47May 31, 2024Updated last year
- ☆17Jan 17, 2025Updated last year
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆14Aug 16, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆25Feb 20, 2024Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆93Feb 3, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 4 months ago
- CTF Writeup including upsolve / Hack The Box Writeup☆21Jul 29, 2025Updated 8 months ago
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆17Jan 8, 2026Updated 3 months ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆26Jan 23, 2024Updated 2 years ago
- ☆13Jul 13, 2024Updated last year
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- ☆13Feb 8, 2025Updated last year
- ☆11Feb 25, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Dec 15, 2022Updated 3 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- Cracking PDF password protection via hashcat.☆16Dec 24, 2025Updated 3 months ago
- Exploits for some linux binaries :)☆36Nov 2, 2025Updated 5 months ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- A collection of challenges I made for CTF competitions☆17Jan 28, 2026Updated 2 months ago
- ☆64Mar 14, 2024Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆14Oct 31, 2023Updated 2 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- ☆14Jul 11, 2024Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago