Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
☆3,888Mar 20, 2026Updated 3 weeks ago
Alternatives and similar repositories for reverse-shell-generator
Users that are interested in reverse-shell-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Apr 1, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,892Updated this week
- Adversary Emulation Framework☆10,958Apr 2, 2026Updated last week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,799Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- Adversary simulation and Red teaming platform with AI☆5,019Mar 31, 2026Updated last week
- Linux privilege escalation auditing tool☆6,451Mar 20, 2026Updated 3 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,436Jan 19, 2025Updated last year
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- Fast web fuzzer written in Go☆15,866Apr 24, 2025Updated 11 months ago
- Monitor linux processes without root permissions☆5,952Mar 1, 2026Updated last month
- An OOB interaction gathering server and client library☆4,263Mar 30, 2026Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,651Feb 8, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Fancy reverse and bind shell handler☆2,877Aug 9, 2024Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,325Mar 10, 2026Updated last month
- The all-in-one browser extension for offensive security professionals 🛠☆6,669Jan 5, 2025Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,341Apr 18, 2023Updated 2 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,338Mar 11, 2026Updated 3 weeks ago
- 🤖 The Modern Port Scanner 🤖☆19,569Apr 2, 2026Updated last week
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆3,351Mar 3, 2026Updated last month
- List of Awesome CobaltStrike Resources☆4,403Sep 20, 2023Updated 2 years ago
- Web path scanner☆14,156Mar 16, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,141Updated this week
- Pre-Built Vulnerable Environments Based on Docker-Compose☆20,492Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,434Mar 16, 2026Updated 3 weeks ago
- EHole(棱洞)3.0 重构版-红队重点攻击系统指纹探测工具☆3,460Apr 2, 2024Updated 2 years ago
- MDUT - Multiple Database Utilization Tools☆2,207Sep 22, 2023Updated 2 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆12,136Updated this week
- shiro反序列化漏洞综合利用,包含(回显执行命令/注入内存马)修复原版中NoCC的问题 https://github.com/j1anFen/shiro_attack☆2,444Mar 28, 2026Updated last week
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,611Feb 23, 2026Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,448Feb 15, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,889Sep 6, 2023Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,881Dec 25, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,837Dec 4, 2025Updated 4 months ago
- OneForAll是一款功能强大的子域收集工具☆9,719Sep 12, 2025Updated 6 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,291Aug 20, 2024Updated last year
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,800Mar 22, 2023Updated 3 years ago