MrPineMan / Awesome-Reverse-ShellLinks
A collection of reverse shells
☆32Updated 5 years ago
Alternatives and similar repositories for Awesome-Reverse-Shell
Users that are interested in Awesome-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆129Updated 4 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- LD_PRELOAD rootkit☆134Updated last year
- Linux privilege escalation via LXD☆136Updated 5 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- ☆47Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 2 years ago
- Posts about different topics☆36Updated last year
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Password list collected from Cisco devices☆19Updated 6 years ago
- LDAP Swiss Army Knife☆49Updated last year
- Linux Persistence Toolkit☆59Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- ☆54Updated 4 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- brute force SSH public-key authentication☆77Updated last month
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆228Updated 6 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 9 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 2 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆149Updated 3 years ago