Basic script to generate reverse shell payloads, generally most used in ctf.
☆27Mar 20, 2024Updated 2 years ago
Alternatives and similar repositories for Rev-Shell
Users that are interested in Rev-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆47May 31, 2024Updated last year
- ☆17Jan 17, 2025Updated last year
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last month
- ☆18Sep 22, 2024Updated last year
- Performs active information gathering about Joomla sites☆17Jul 13, 2017Updated 8 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- 远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查☆12Aug 9, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- A Python Program that uses OpenCV and Scapy module to brute force RTSP (Real Time Streaming Protocol) Service used by IoT (Internet of Th…☆10Oct 31, 2024Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆92Feb 3, 2025Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 3 months ago
- CTF Writeup including upsolve / Hack The Box Writeup☆21Jul 29, 2025Updated 7 months ago
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆16Jan 8, 2026Updated 2 months ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆25Jan 23, 2024Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Jul 9, 2023Updated 2 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- ☆13Feb 8, 2025Updated last year
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- ☆11Feb 25, 2026Updated 3 weeks ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Cracking PDF password protection via hashcat.☆15Dec 24, 2025Updated 3 months ago
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 4 years ago
- Exploits for some linux binaries :)☆37Nov 2, 2025Updated 4 months ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Demo repository showcasing how to use reusable workflows to build artifact attestations☆15Mar 16, 2026Updated last week
- ☆64Mar 14, 2024Updated 2 years ago