PowerShell ReverseTCP Shell - Framework
☆1,064Sep 18, 2022Updated 3 years ago
Alternatives and similar repositories for ReverseTCPShell
Users that are interested in ReverseTCPShell are comparing it to the libraries listed below
Sorting:
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆642Dec 9, 2019Updated 6 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,426Jul 20, 2024Updated last year
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,348Dec 7, 2020Updated 5 years ago
- Open source pre-operation C2 server based on python and powershell☆762Jul 6, 2021Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,528Jun 30, 2023Updated 2 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- Cobalt Strike插件 - RDP日志取证&清除☆363Dec 23, 2019Updated 6 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- 增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持☆968Jun 16, 2024Updated last year
- 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~☆498Feb 13, 2020Updated 6 years ago
- Cobalt Strike系列☆2,411Dec 3, 2023Updated 2 years ago
- Load shellcode into a new process☆768Jun 2, 2021Updated 4 years ago
- Payload Generation Framework☆1,964Aug 21, 2024Updated last year
- 免杀webshell无限生成工具☆1,288Apr 3, 2020Updated 5 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- cobaltstrike ms17-010 module and some other☆419Jun 13, 2019Updated 6 years ago
- Red Team Tool Kit☆1,133Dec 8, 2022Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,727Jan 16, 2026Updated last month
- CobaltStrike后渗透测试插件☆1,554Oct 28, 2021Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,606Jul 10, 2023Updated 2 years ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,464Jan 20, 2025Updated last year
- ☆1,380Jul 2, 2020Updated 5 years ago
- A JSP backdoor that enables under Tomcat hiding arbitrary JSP files, in addition to their access logs.☆216Mar 31, 2019Updated 6 years ago
- Cooolis-ms是一 个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的…☆929Jan 7, 2026Updated last month
- Process Injection☆766Oct 24, 2021Updated 4 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,151May 11, 2022Updated 3 years ago
- Mimikatz implementation in pure Python☆3,245Jan 2, 2026Updated last month
- Redis 4.x/5.x RCE☆975Nov 30, 2021Updated 4 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,620Jul 18, 2024Updated last year
- cve-2020-0688☆329Jul 4, 2023Updated 2 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,012Jul 3, 2018Updated 7 years ago
- anti AV☆292Mar 12, 2020Updated 5 years ago
- CVE-2019-2725 命令回显☆436May 8, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆768Feb 16, 2021Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,546Aug 2, 2019Updated 6 years ago
- Windows Exploit Suggester - Next Generation☆4,765Feb 19, 2026Updated last week