NHAS / reverse_sshLinks
SSH based reverse shell
☆1,314Updated last week
Alternatives and similar repositories for reverse_ssh
Users that are interested in reverse_ssh are comparing it to the libraries listed below
Sorting:
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆1,026Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,255Updated last month
- ↕️🤫 Stealth redirector for your red team operation security☆1,061Updated 7 months ago
- ☆2,181Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,166Updated last month
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,069Updated last week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,005Updated this week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,398Updated 2 weeks ago
- reverse shell using curl☆476Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,008Updated 3 weeks ago
- Another Windows Local Privilege Escalation from Service Account to System☆936Updated 3 years ago
- A small reverse shell for Linux & Windows☆625Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,783Updated 3 years ago
- Just another Powerview alternative but on steroids☆860Updated last month
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆643Updated 9 months ago
- HVNC for Cobalt Strike☆1,294Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆878Updated 10 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆626Updated last week
- Dominate Active Directory with PowerShell.☆1,158Updated 2 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆476Updated 2 years ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,191Updated 2 weeks ago
- Sandman is a NTP based backdoor for hardened networks.☆816Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,234Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,799Updated 2 months ago
- Penelope Shell Handler☆1,499Updated this week
- A Linux/Windows C2 framework made by a Linux user☆1,684Updated this week
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆406Updated last year
- evilginx3 + gophish☆1,949Updated last year
- Windows remote execution multitool☆779Updated 4 months ago