shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct a non interactive reverse shell to execute the Windows commands
☆27Oct 3, 2025Updated 7 months ago
Alternatives and similar repositories for shellDAVpass
Users that are interested in shellDAVpass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆32Apr 4, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 3 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆28Nov 26, 2025Updated 5 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Nov 10, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 3 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- Quick and dirty PoSH code to read teams messages☆23Feb 5, 2025Updated last year
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Mar 9, 2023Updated 3 years ago
- AutoStart teamserver and listeners with services☆74Dec 23, 2021Updated 4 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- MultiPlatform ArpSpoofer Written in python☆21Mar 10, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆24Nov 8, 2019Updated 6 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 5 months ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Bad Apple in Amiga Anim format, complete with a guide on how to make your own Sound Anims☆10Jul 2, 2020Updated 5 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- A set of scripts to help automate the management of Burp Collaborator☆13Sep 5, 2025Updated 8 months ago
- Script to help enumerate and dig through Github and Github Enterprise installations.☆15Nov 30, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- IP address filter by City☆12Jan 17, 2025Updated last year
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆19Jul 17, 2025Updated 10 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 9 months ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- Multipurpose malware framework☆28Dec 6, 2021Updated 4 years ago
- ☆10Oct 29, 2019Updated 6 years ago
- Documentation for Blueprint build with Jigsaw☆11Dec 9, 2025Updated 5 months ago
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆13Jan 24, 2026Updated 3 months ago
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆72Apr 17, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆39Aug 30, 2022Updated 3 years ago
- nvidia-smi xml to json☆15May 29, 2024Updated last year
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 5 months ago
- A platform based on Node & RasPi to allow anyone to easily build apps and games for a NeoPixel table.☆10Mar 5, 2023Updated 3 years ago
- NetHawk is your network security analysis tool that provides features and alerts via Discord when network attacks occur with score report…☆18May 14, 2026Updated last week
- Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads …☆13Aug 20, 2025Updated 9 months ago