HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
☆248Sep 9, 2021Updated 4 years ago
Alternatives and similar repositories for HRShell
Users that are interested in HRShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 2 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆97Aug 13, 2022Updated 3 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🐚 404 Page Not Found Webshell☆88Jul 25, 2022Updated 3 years ago
- ☆25May 9, 2021Updated 4 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- PowerShell ReverseTCP Shell - Framework☆1,064Sep 18, 2022Updated 3 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Mar 24, 2021Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆291Jan 5, 2026Updated 3 months ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Python / C# Unmanaged PowerShell based RAT☆775Mar 29, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- A modular C2 framework☆527Apr 15, 2026Updated 2 weeks ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆808Dec 19, 2023Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 6 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆142May 30, 2019Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆824Nov 15, 2025Updated 5 months ago
- A Golang implant that uses Slack as a command and control server☆462Feb 25, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,337Dec 6, 2023Updated 2 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Jan 31, 2020Updated 6 years ago
- Ex-pv8's☆64Aug 28, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,105Nov 20, 2025Updated 5 months ago
- Automated 802.1x Bypass☆89Mar 11, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 6 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆702Jul 27, 2020Updated 5 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Apr 29, 2019Updated 7 years ago
- Open source pre-operation C2 server based on python and powershell☆767Jul 6, 2021Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 9 months ago