Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
☆3,944Apr 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for reverse-shell-generator
Users that are interested in reverse-shell-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,848May 15, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,742Updated this week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆13,241Apr 20, 2026Updated last month
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,713Updated this week
- Adversary Emulation Framework☆11,206May 7, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Adversary simulation and Red teaming platform with AI☆5,043Mar 31, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,765Apr 22, 2026Updated last month
- Linux privilege escalation auditing tool☆6,498Mar 20, 2026Updated 2 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,457Jan 19, 2025Updated last year
- The Havoc Framework☆8,361Dec 18, 2025Updated 5 months ago
- Fast web fuzzer written in Go☆16,063Apr 26, 2026Updated 3 weeks ago
- Monitor linux processes without root permissions☆6,018Mar 1, 2026Updated 2 months ago
- An OOB interaction gathering server and client library☆4,321May 13, 2026Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,786Apr 15, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Fancy reverse and bind shell handler☆2,889Aug 9, 2024Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,378Mar 10, 2026Updated 2 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,717Jan 5, 2025Updated last year
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,360Mar 11, 2026Updated 2 months ago
- 🤖 The Modern Port Scanner 🤖☆19,793Apr 30, 2026Updated 3 weeks ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,359Apr 18, 2023Updated 3 years ago
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆3,363Mar 3, 2026Updated 2 months ago
- List of Awesome CobaltStrike Resources☆4,416Sep 20, 2023Updated 2 years ago
- Web path scanner☆14,265Apr 29, 2026Updated 3 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,309Updated this week
- Pre-Built Vulnerable Environments Based on Docker-Compose☆20,721May 12, 2026Updated last week
- EHole(棱洞)3.0 重构版-红队重点攻击系统指纹探测工具☆3,473Apr 2, 2024Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,553May 9, 2026Updated last week
- MDUT - Multiple Database Utilization Tools☆2,210Sep 22, 2023Updated 2 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆12,377Updated this week
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,660May 1, 2026Updated 3 weeks ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,562Feb 15, 2026Updated 3 months ago
- shiro反序列化漏洞综合利用,包含(回显执行命令/注入内存马)修复原版中NoCC的问题 https://github.com/j1anFen/shiro_attack☆2,508Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,920Sep 6, 2023Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,908May 3, 2026Updated 2 weeks ago
- A swiss army knife for pentesting networks☆9,131Dec 6, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,894Dec 4, 2025Updated 5 months ago
- OneForAll是一款功能强大的子域收集工具☆9,779May 11, 2026Updated last week
- A tool to perform Kerberos pre-auth bruteforcing☆3,333Aug 20, 2024Updated last year
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,803Mar 22, 2023Updated 3 years ago