SkyperTHC / curlshellLinks
reverse shell using curl
☆207Updated 7 months ago
Alternatives and similar repositories for curlshell
Users that are interested in curlshell are comparing it to the libraries listed below
Sorting:
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆277Updated 7 months ago
- nysm is a stealth post-exploitation container.☆261Updated 3 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆265Updated last week
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640☆106Updated last year
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆132Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆253Updated last month
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Updated last year
- reverse shell using curl☆461Updated last year
- CVE-2023-24055 PoC (KeePass 2.5x)☆254Updated 2 years ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆211Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆180Updated last year
- Harvest passwords automatically from OpenSSH server☆375Updated 2 years ago
- ☆232Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆103Updated last year
- CVE-2024-3400 Palo Alto OS Command Injection☆161Updated last year
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆106Updated 4 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆214Updated 5 months ago
- CVE-2024-3400☆72Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆132Updated 11 months ago
- CVE-2023-22515: Confluence Broken Access Control Exploit☆137Updated last year
- Seamless remote browser session control☆210Updated 3 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆390Updated 4 months ago
- SSH Zero-Day Made By ClumsyLulz☆124Updated 7 months ago
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆237Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆233Updated 2 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆123Updated 3 years ago
- A delicious, but malicious SSL-VPN server 🌮☆250Updated last week