NHAS / reverse_sshLinks
SSH based reverse shell
☆1,298Updated 3 weeks ago
Alternatives and similar repositories for reverse_ssh
Users that are interested in reverse_ssh are comparing it to the libraries listed below
Sorting:
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆1,017Updated 2 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,022Updated 5 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,240Updated 2 weeks ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,144Updated 3 months ago
- ☆2,144Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,378Updated 3 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,466Updated 2 years ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆986Updated last month
- HVNC for Cobalt Strike☆1,293Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,035Updated 2 weeks ago
- reverse shell using curl☆473Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆979Updated last week
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆474Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,134Updated 3 weeks ago
- Sandman is a NTP based backdoor for hardened networks.☆813Updated last year
- Just another Powerview alternative but on steroids☆849Updated last month
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,180Updated 10 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,231Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆933Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆626Updated last week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆877Updated 9 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,196Updated 2 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆723Updated 2 years ago
- ☆2,455Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆828Updated 9 months ago
- The swiss army knife of LSASS dumping☆2,044Updated last year
- A python script to scan for Apache Tomcat server vulnerabilities.☆884Updated last month
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆632Updated 8 months ago
- evilginx3 + gophish☆1,925Updated last year