A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
☆87Apr 8, 2025Updated last year
Alternatives and similar repositories for gorsh
Users that are interested in gorsh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Aug 10, 2019Updated 6 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆146Mar 3, 2023Updated 3 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,085Apr 5, 2022Updated 4 years ago
- Passwords Recovery Tool☆234Feb 3, 2021Updated 5 years ago
- A WebSocket C2 Tool☆415Nov 24, 2017Updated 8 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- Multiplatform reverse shell generator☆593Mar 26, 2020Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆775Mar 29, 2023Updated 3 years ago
- a CLI for ephemeral penetration testing☆17Dec 10, 2019Updated 6 years ago
- Golang reverse/bind shell generator☆228Jan 3, 2022Updated 4 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆379Aug 13, 2021Updated 4 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 3 years ago
- A simple COM server which provides a component to run shellcode☆144May 12, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆705Feb 24, 2024Updated 2 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 7 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆80Mar 13, 2026Updated last month
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 12 years ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 9 months ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- grim reaper c2☆348Nov 19, 2022Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 7 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- CobaltStrike External C2 for Websockets☆196Jul 16, 2019Updated 6 years ago