ZHacker13 / ReverseTCPShellLinks
PowerShell ReverseTCP Shell - Framework
☆1,055Updated 2 years ago
Alternatives and similar repositories for ReverseTCPShell
Users that are interested in ReverseTCPShell are comparing it to the libraries listed below
Sorting:
- The Shadow Attack Framework☆1,108Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Updated 4 years ago
- HTA encryption tool for RedTeams☆1,398Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,505Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,281Updated 3 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆696Updated 4 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆583Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,539Updated 5 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,258Updated last year
- Run PowerShell command without invoking powershell.exe☆1,507Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,615Updated 2 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆572Updated 5 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,370Updated 4 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,392Updated 4 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,798Updated 4 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆806Updated last month
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,928Updated 2 months ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,526Updated 6 years ago
- Extract credentials from lsass remotely☆2,118Updated last month
- A PowerShell script anti-virus evasion tool☆1,138Updated 2 years ago
- Red Team Tool Kit☆1,118Updated 2 years ago
- PowerShell Pass The Hash Utils☆1,593Updated 6 years ago
- Proof of concept for CVE-2019-0708☆1,185Updated 3 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,501Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆751Updated 3 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,005Updated 6 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,112Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,423Updated 2 years ago
- Various PowerShell scripts that may be useful during red team exercise☆948Updated 3 years ago