SkyperTHC / curlshell
reverse shell using curl
โ204Updated 9 months ago
Alternatives and similar repositories for curlshell:
Users that are interested in curlshell are comparing it to the libraries listed below
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)โ241Updated last year
- nysm is a stealth post-exploitation container.โ242Updated last year
- A delicious, but malicious SSL-VPN server ๐ฎโ200Updated 2 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Eventsโ217Updated 9 months ago
- eBPF hacksโ181Updated last month
- Make BASH stealthy and hacker friendly with lots of bash functionsโ230Updated last week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerโฆโ349Updated 9 months ago
- Get root via TTY / TIOCSTI stuffingโ68Updated 6 months ago
- Harvest passwords automatically from OpenSSH serverโ366Updated last year
- reverse shell using curlโ451Updated 9 months ago
- Go shellcode loader that combines multiple evasion techniquesโ361Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targetโฆโ350Updated 2 weeks ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.โ507Updated 3 weeks ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEโ187Updated 2 months ago
- yet another AV killer tool using BYOVDโ264Updated last year
- Source Code Management Attack Toolkitโ212Updated 2 years ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.โ504Updated 5 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation fโฆโ162Updated 7 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkโ544Updated 7 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).โ512Updated 10 months ago
- Session Hijacking Visual Exploitationโ196Updated 10 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.โ340Updated 2 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHoundโ504Updated 2 months ago
- ๐ Shell command obfuscation to avoid detection systemsโ124Updated 2 years ago
- Simulate the behavior of AV/EDR for malware development training.โ458Updated 11 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic loโฆโ259Updated 2 years ago
- โ407Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.โ506Updated 3 weeks ago
- RCE exploit for CVE-2023-3519โ221Updated last year
- Repository to store exploits created by Assetnotes Security Research teamโ175Updated last year