SkyperTHC / curlshell
reverse shell using curl
☆205Updated last week
Alternatives and similar repositories for curlshell:
Users that are interested in curlshell are comparing it to the libraries listed below
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆243Updated last year
- eBPF hacks☆182Updated 2 months ago
- nysm is a stealth post-exploitation container.☆243Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆350Updated 10 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆166Updated 9 months ago
- Get root via TTY / TIOCSTI stuffing☆69Updated 7 months ago
- reverse shell using curl☆452Updated 10 months ago
- A delicious, but malicious SSL-VPN server 🌮☆206Updated 3 months ago
- Session Hijacking Visual Exploitation☆196Updated 11 months ago
- Repository to store exploits created by Assetnotes Security Research team☆175Updated last year
- ☆531Updated 11 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆215Updated 10 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆172Updated 5 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆350Updated last month
- Harvest passwords automatically from OpenSSH server☆368Updated last year
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640☆108Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆236Updated this week
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆200Updated last month
- Awesome AV/EDR/XDR Bypass Tips☆263Updated last year
- RCE exploit for CVE-2023-3519☆221Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆507Updated 6 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆229Updated last year
- Go shellcode loader that combines multiple evasion techniques☆363Updated last year
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆131Updated 9 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆141Updated 11 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆266Updated last year
- This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be…☆208Updated 3 weeks ago
- Kubernetes exploitation tool☆362Updated 7 months ago
- ☆406Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated last year