A python reverse shell that uses DNS as the c2 channel
☆507Oct 10, 2015Updated 10 years ago
Alternatives and similar repositories for Reverse_DNS_Shell
Users that are interested in Reverse_DNS_Shell are comparing it to the libraries listed below
Sorting:
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Oct 10, 2015Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- DNS-Shell is an interactive Shell over DNS channel☆530Oct 11, 2020Updated 5 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- Simple reverse ICMP shell☆1,616Apr 6, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,271Sep 4, 2022Updated 3 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- tools☆542Apr 9, 2019Updated 6 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- It is a hack tool kit for pentest and web security research.☆517Oct 2, 2020Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,152Mar 6, 2025Updated 11 months ago
- ☆3,839Mar 14, 2024Updated last year
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- My musings with PowerShell☆2,704Nov 19, 2021Updated 4 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Will to be a niubility scan-framework☆519Jul 1, 2025Updated 8 months ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,081Apr 5, 2022Updated 3 years ago
- Reverse Shell as a Service☆66Nov 9, 2020Updated 5 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Some useful scripts for CobaltStrike☆859Dec 17, 2020Updated 5 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- a plenty of poc based on python☆290Jun 10, 2017Updated 8 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆459Mar 2, 2021Updated 5 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- Vulnerability Labs for security analysis☆1,172Mar 10, 2021Updated 4 years ago
- Post Exploitation Collection☆1,569May 1, 2020Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,012Jul 3, 2018Updated 7 years ago