Sh3ller is a lightweight C2 framework in its simplest form.
☆31Sep 5, 2025Updated 6 months ago
Alternatives and similar repositories for Sh3ller
Users that are interested in Sh3ller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Oct 28, 2025Updated 4 months ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 4 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Arbitrary command execution on Open Folder via .vscode/tasks.json☆33Jan 19, 2026Updated 2 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 6 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 8 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Group Policy Objects manipulation and exploitation framework☆298Dec 7, 2025Updated 3 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆38Nov 11, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A stager and implant that executes remote Web Assembly☆60Feb 4, 2026Updated last month
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- ☆36Jul 1, 2025Updated 8 months ago
- ☆27Oct 1, 2025Updated 5 months ago
- Advanced In-Memory PowerShell Process Injection Framework☆73Jul 16, 2025Updated 8 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆93Aug 3, 2025Updated 7 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆107Jan 26, 2026Updated last month
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 7 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 8 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆167Jan 12, 2026Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆98Dec 28, 2025Updated 2 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A Mythic agent for Windows written in C☆162Mar 14, 2026Updated last week
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago