Simple CLI tool for the generation of bind and reverse shells in multiple languages
☆390Feb 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for shellerator
Users that are interested in shellerator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- Python script wrote to automate the process of generating various reverse shells.☆199Jan 3, 2026Updated 2 months ago
- A small reverse shell for Linux & Windows☆619Jun 5, 2024Updated last year
- ☆37Apr 30, 2020Updated 5 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Fully featured and community-driven hacking environment☆2,951Mar 8, 2026Updated 2 weeks ago
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago
- Mimikatz implementation in pure Python☆3,257Jan 2, 2026Updated 2 months ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- ☆667Nov 17, 2021Updated 4 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆2,243Feb 25, 2023Updated 3 years ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- Extract credentials from lsass remotely☆2,184Dec 24, 2025Updated 2 months ago
- Bypass for PowerShell Constrained Language Mode☆407Dec 23, 2021Updated 4 years ago
- Dumping DPAPI credz remotely☆1,348Mar 24, 2025Updated last year
- ☆1,674Apr 14, 2025Updated 11 months ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆386Oct 27, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,932Sep 23, 2022Updated 3 years ago
- Pop shells like a master.☆1,491Apr 2, 2019Updated 6 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆356Apr 15, 2023Updated 2 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,759Feb 27, 2026Updated 3 weeks ago
- Privilege Escalation Enumeration Script for Windows☆3,759Jan 30, 2026Updated last month
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- ☆361Apr 24, 2021Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,452Dec 18, 2022Updated 3 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Mar 27, 2025Updated 11 months ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,662Nov 28, 2020Updated 5 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,197Jan 20, 2023Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,560Mar 11, 2026Updated last week
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year