SSH based reverse shell
☆1,322Jan 27, 2026Updated last month
Alternatives and similar repositories for reverse_ssh
Users that are interested in reverse_ssh are comparing it to the libraries listed below
Sorting:
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- New generation of wmiexec.py☆1,254Jan 5, 2026Updated last month
- HVNC for Cobalt Strike☆1,298Dec 7, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- ☆2,198Nov 24, 2023Updated 2 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,562Aug 20, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,259Dec 9, 2025Updated 2 months ago
- Supershell C2 远控平台,基于反向SSH隧道获取完全交互式Shell☆1,772Sep 26, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,230Aug 18, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,400Nov 22, 2023Updated 2 years ago
- The Havoc Framework☆8,190Dec 18, 2025Updated 2 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,066Jul 6, 2025Updated 7 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated last month
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,689Updated this week
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆680Oct 23, 2024Updated last year
- A modern multiple reverse shell sessions manager written in go☆1,636Updated this week
- A C# Command & Control framework☆1,026Mar 28, 2024Updated last year
- Standalone utility for service discovery on open ports!☆718Jan 13, 2026Updated last month
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,170Feb 25, 2023Updated 3 years ago
- Adversary Emulation Framework☆10,717Updated this week
- Msmap is a Memory WebShell Generator.☆584Apr 22, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,182Jan 5, 2026Updated last month
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,367Oct 27, 2023Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,408Jan 19, 2026Updated last month
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,127Oct 21, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,873Aug 18, 2023Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,301Feb 15, 2026Updated last week
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,606Jul 10, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆522Nov 18, 2025Updated 3 months ago
- Dominate Active Directory with PowerShell.☆1,164Nov 28, 2025Updated 3 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,092Jan 31, 2026Updated last month
- Windows Token Stealing Expert☆485Nov 24, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,155Mar 28, 2025Updated 10 months ago