botnet frontend i wrote in a night and then improved over a few other nights
☆13Apr 11, 2019Updated 6 years ago
Alternatives and similar repositories for sh3llparty
Users that are interested in sh3llparty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- See more current version at https://github.com/ElectionDataAnalysis/election_data_analysis/☆10Jul 6, 2023Updated 2 years ago
- Extra sauced bitwarden mobile app☆13Jul 29, 2024Updated last year
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- wifi破解☆12Nov 11, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Unified repository for different Metasploit Framework payloads☆49Jan 30, 2020Updated 6 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 5 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- ☆122Jan 7, 2026Updated 2 months ago
- POC for CVE-2019-14339 Canon PRINT 2.5.5☆14Sep 15, 2019Updated 6 years ago
- a collection of teaching resources☆12Feb 27, 2018Updated 8 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A lightweight and useful config of PowerShell.☆13Feb 16, 2020Updated 6 years ago
- This program encodes text in a bitmap image (.bmp). It works by using LSB steganography which is the process of modifying the least sign…☆11Jan 13, 2020Updated 6 years ago
- carbanak\group_ib_smart_boys☆12Jul 12, 2018Updated 7 years ago
- ☆11Apr 17, 2017Updated 8 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆40Nov 20, 2018Updated 7 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23May 21, 2024Updated last year
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- DNS tunneling implemented in Python☆18Jan 5, 2024Updated 2 years ago
- Certificate Revocation check support for caddy☆25Mar 19, 2026Updated last week
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)☆14Mar 11, 2020Updated 6 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated last month
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- https://github.com/jakejarvis/awesome-shodan-queries☆19Jan 20, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Android kernel source tree for OnePlus msm8996 devices☆10Nov 24, 2017Updated 8 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Few scripts to setup a timelapse camera☆11Nov 19, 2025Updated 4 months ago