NHAS / reverse_ssh
SSH based reverse shell
☆1,037Updated 2 weeks ago
Alternatives and similar repositories for reverse_ssh:
Users that are interested in reverse_ssh are comparing it to the libraries listed below
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆951Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆814Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,430Updated last year
- A small reverse shell for Linux & Windows☆596Updated 8 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,182Updated last year
- Linux/Windows post-exploitation framework made by linux user☆1,485Updated this week
- A modern multiple reverse shell sessions manager written in go☆1,567Updated last month
- ☆1,881Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,044Updated last week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,886Updated this week
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,069Updated 2 weeks ago
- HVNC for Cobalt Strike☆1,188Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆659Updated 6 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆409Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆407Updated last year
- Script for generating revshells☆461Updated 5 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,167Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆783Updated 10 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,745Updated 2 years ago
- reverse shell using curl☆452Updated 9 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,085Updated 2 weeks ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,438Updated last year
- The swiss army knife of LSASS dumping☆1,852Updated 4 months ago
- Just another Powerview alternative☆564Updated 3 weeks ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆557Updated 3 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆830Updated 2 years ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆563Updated 4 months ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆840Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,786Updated last year
- Reverse SOCKS5 implementation in Go☆341Updated 11 months ago