Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
☆3,816Jun 14, 2025Updated 8 months ago
Alternatives and similar repositories for reverse-shell-generator
Users that are interested in reverse-shell-generator are comparing it to the libraries listed below
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,340Feb 14, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,493Updated this week
- Adversary Emulation Framework☆10,717Updated this week
- Adversary simulation and Red teaming platform with AI☆4,971Jan 18, 2026Updated last month
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,194Updated this week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,698Updated this week
- The Havoc Framework☆8,190Dec 18, 2025Updated 2 months ago
- Linux privilege escalation auditing tool☆6,401Feb 19, 2026Updated last week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,421Jan 19, 2025Updated last year
- Fast web fuzzer written in Go☆15,637Apr 24, 2025Updated 10 months ago
- An OOB interaction gathering server and client library☆4,201Feb 19, 2026Updated last week
- List of Awesome CobaltStrike Resources☆4,386Sep 20, 2023Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,260Feb 20, 2026Updated last week
- The all-in-one browser extension for offensive security professionals 🛠☆6,633Jan 5, 2025Updated last year
- Fancy reverse and bind shell handler☆2,868Aug 9, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated last week
- Monitor linux processes without root permissions☆5,891Jan 17, 2023Updated 3 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,302Apr 18, 2023Updated 2 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,983Updated this week
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆3,315Apr 5, 2025Updated 10 months ago
- Web path scanner☆14,017Feb 20, 2026Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,923Updated this week
- generate CobaltStrike's cross-platform payload☆2,542Nov 20, 2023Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,336Dec 6, 2025Updated 2 months ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,311Jan 4, 2026Updated last month
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,544Feb 8, 2026Updated 2 weeks ago
- MDUT - Multiple Database Utilization Tools☆2,190Sep 22, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,765Dec 4, 2025Updated 2 months ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,562Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,775Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,548Updated this week
- A tool to perform Kerberos pre-auth bruteforcing☆3,255Aug 20, 2024Updated last year
- Pre-Built Vulnerable Environments Based on Docker-Compose☆20,312Feb 14, 2026Updated 2 weeks ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,842Sep 6, 2023Updated 2 years ago
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,782Mar 22, 2023Updated 2 years ago
- OneForAll是一款功能强大的子域收集工具☆9,635Sep 12, 2025Updated 5 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,855Dec 25, 2023Updated 2 years ago
- shiro反序列化漏洞综合利用,包含(回显执行命令/注入内存马)修复原版中NoCC的问题 https://github.com/j1anFen/shiro_attack☆2,379Apr 10, 2024Updated last year