chrispetrou / HRShellLinks
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
☆248Updated 4 years ago
Alternatives and similar repositories for HRShell
Users that are interested in HRShell are comparing it to the libraries listed below
Sorting:
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆350Updated 4 years ago
- Windows active user credential phishing tool☆283Updated 5 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Updated 6 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆316Updated 4 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Updated 7 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆269Updated 8 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆274Updated 8 months ago
- A tool to create obfuscated HTA script.☆178Updated 4 years ago
- Simple python backdoor with Ngrok tunnel support☆207Updated 2 years ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆242Updated 4 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆385Updated 5 years ago
- Easy files and payloads delivery over DNS☆424Updated last month
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- B4TM4N ~ PHP WEBSHELL☆191Updated last year
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 5 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Evading Anti-Virus with Unusual Technique☆216Updated 2 years ago
- Network Pivoting Toolkit☆456Updated 2 years ago
- APT34/OILRIG leak☆232Updated 6 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- Collection of Windows Hacking Binaries☆53Updated 10 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Updated 6 years ago
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆380Updated 10 months ago
- Pip install exploit package☆157Updated 7 years ago
- Rapid Attack Infrastructure (RAI)☆310Updated last year