NHAS / reverse_sshLinks
SSH based reverse shell
☆1,314Updated last week
Alternatives and similar repositories for reverse_ssh
Users that are interested in reverse_ssh are comparing it to the libraries listed below
Sorting:
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆1,026Updated 2 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,060Updated 6 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,166Updated last month
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,255Updated last month
- ☆2,181Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,469Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,069Updated this week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,398Updated 2 weeks ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,005Updated this week
- Dominate Active Directory with PowerShell.☆1,157Updated 2 months ago
- HVNC for Cobalt Strike☆1,294Updated 2 years ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆640Updated 9 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,008Updated 3 weeks ago
- Just another Powerview alternative but on steroids☆860Updated last month
- reverse shell using curl☆476Updated last year
- Linux/Windows post-exploitation framework made by linux user☆1,681Updated last week
- Another Windows Local Privilege Escalation from Service Account to System☆936Updated 3 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆625Updated last week
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,191Updated last week
- Penelope Shell Handler☆1,499Updated this week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆878Updated 10 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,674Updated this week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆816Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆448Updated 2 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,232Updated last month
- A small reverse shell for Linux & Windows☆625Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆476Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,121Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆403Updated last year