chrispetrou / HRShell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
☆246Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for HRShell
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆245Updated last year
- Windows active user credential phishing tool☆277Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆530Updated 2 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago
- Network Pivoting Toolkit☆435Updated last year
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆338Updated 3 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆373Updated 3 years ago
- Simple python backdoor with Ngrok tunnel support☆200Updated 11 months ago
- Embed and hide any file in an HTML file☆482Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆289Updated 4 years ago
- Evading Anti-Virus with Unusual Technique☆211Updated last year
- This is a weaponized WSUS exploit☆281Updated last year
- Aggressor scripts I've made for Cobalt Strike☆404Updated last year
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆437Updated 11 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 5 months ago
- Rapid Attack Infrastructure (RAI)☆297Updated 3 years ago
- Search Exploitable Software on Linux☆222Updated last year
- A WebSocket C2 Tool☆387Updated 6 years ago
- ☆287Updated 4 years ago
- APT34/OILRIG leak☆231Updated 5 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 4 years ago
- A framework for stealthy domain reconnaissance☆293Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆537Updated 3 years ago
- A library of pretexts to use on offensive phishing engagements.☆327Updated 5 years ago