audibleblink / gorshLinks
A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
☆88Updated last month
Alternatives and similar repositories for gorsh
Users that are interested in gorsh are comparing it to the libraries listed below
Sorting:
- Go-deliver is a payload delivery tool coded in Go.☆115Updated 6 years ago
- A simple, extensible C&C beaconing system.☆100Updated 7 years ago
- Nmap XML parsing library for Go☆101Updated 2 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆428Updated 3 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 3 years ago
- Golang reverse/bind shell generator☆228Updated 3 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆377Updated 3 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- nextnet is a pivot point discovery tool written in Go.☆451Updated 4 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- nray distributed port scanner☆154Updated 2 years ago
- CLI tool for PKCS7 padding oracle attacks☆137Updated 4 years ago
- Hershell is a simple TCP reverse shell written in Go.☆531Updated 5 years ago
- PowerDNS: Powershell DNS Delivery☆212Updated 6 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆104Updated 3 years ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Hawkeye filesystem analysis tool☆235Updated 6 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆147Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago