Simple CLI tool for the generation of bind and reverse shells in multiple languages
☆392Feb 27, 2026Updated 2 months ago
Alternatives and similar repositories for shellerator
Users that are interested in shellerator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- Python script wrote to automate the process of generating various reverse shells.☆198Jan 3, 2026Updated 4 months ago
- A small reverse shell for Linux & Windows☆640Jun 5, 2024Updated last year
- ☆37Apr 30, 2020Updated 6 years ago
- Fully featured and community-driven hacking environment☆2,982Apr 9, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Active Directory ACL exploitation with BloodHound☆761Nov 18, 2021Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Apr 24, 2018Updated 8 years ago
- Mimikatz implementation in pure Python☆3,300Apr 9, 2026Updated 3 weeks ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,662Aug 28, 2025Updated 8 months ago
- ☆670Nov 17, 2021Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆2,249Feb 25, 2023Updated 3 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- Bypass for PowerShell Constrained Language Mode☆406Dec 23, 2021Updated 4 years ago
- Extract credentials from lsass remotely☆2,200Mar 23, 2026Updated last month
- Dumping DPAPI credz remotely☆1,361Mar 24, 2025Updated last year
- ☆1,683Apr 14, 2025Updated last year
- Password spraying and bruteforcing tool for Active Directory Domain Services☆387Oct 27, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,173Sep 29, 2021Updated 4 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,940Sep 23, 2022Updated 3 years ago
- Pop shells like a master.☆1,486Apr 2, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆357Apr 15, 2023Updated 3 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,802Feb 27, 2026Updated 2 months ago
- Privilege Escalation Enumeration Script for Windows☆3,819Apr 16, 2026Updated 2 weeks ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆812Aug 28, 2022Updated 3 years ago
- ☆361Apr 24, 2021Updated 5 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801May 19, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Mar 27, 2025Updated last year
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,671Nov 28, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,212Jan 20, 2023Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,358Mar 10, 2026Updated last month
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year