SkyperTHC / curlshell
reverse shell using curl
☆205Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for curlshell
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆239Updated 9 months ago
- nysm is a stealth post-exploitation container.☆237Updated 11 months ago
- reverse shell using curl☆448Updated 7 months ago
- ☆493Updated 7 months ago
- Repository to store exploits created by Assetnotes Security Research team☆174Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆493Updated 3 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆343Updated 7 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆205Updated this week
- ☆402Updated 2 years ago
- Harvest passwords automatically from OpenSSH server☆358Updated last year
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆130Updated 6 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆152Updated 5 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆339Updated 2 months ago
- Escalate Service Account To LocalSystem via Kerberos☆390Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆242Updated last month
- ☆220Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆517Updated 4 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆399Updated last year
- CVE-2023-24055 PoC (KeePass 2.5x)☆254Updated last year
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆228Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆242Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆269Updated last month
- HookChain: A new perspective for Bypassing EDR Solutions☆410Updated last week
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 7 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆312Updated this week
- eBPF hacks☆173Updated 2 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆475Updated 8 months ago
- Get root via TTY / TIOCSTI stuffing☆62Updated 4 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆551Updated 4 months ago