Fahrj / reverse-ssh
Statically-linked ssh server with reverse shell functionality for CTFs and such
☆940Updated last year
Alternatives and similar repositories for reverse-ssh:
Users that are interested in reverse-ssh are comparing it to the libraries listed below
- SSH based reverse shell☆1,018Updated 3 weeks ago
- A small reverse shell for Linux & Windows☆593Updated 7 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,732Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆806Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,813Updated 2 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,464Updated this week
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,228Updated 5 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,230Updated 7 months ago
- Abusing impersonation privileges through the "Printer Bug"☆1,910Updated 4 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,048Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,373Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,575Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,049Updated 2 weeks ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,067Updated 3 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,063Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,351Updated 2 years ago
- A collection of statically compiled tools like Nmap and Socat.☆433Updated 9 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,516Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆996Updated 7 months ago
- ☆1,861Updated last year
- A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.☆1,703Updated last year
- A modern multiple reverse shell sessions manager written in go☆1,550Updated 3 weeks ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,653Updated 4 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,475Updated 3 years ago
- Extract credentials from lsass remotely☆2,079Updated 2 weeks ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,414Updated last year
- Monitor linux processes without root permissions☆5,059Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆554Updated 2 months ago
- Hash type identifier (CLI & lib)☆818Updated last month
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,098Updated 5 months ago