chrispetrou / HRShellLinks
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
☆249Updated 4 years ago
Alternatives and similar repositories for HRShell
Users that are interested in HRShell are comparing it to the libraries listed below
Sorting:
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255Updated 2 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆349Updated 4 years ago
- Windows active user credential phishing tool☆284Updated 5 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Updated 4 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆274Updated 7 months ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- Search Exploitable Software on Linux☆233Updated 2 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆384Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆206Updated 2 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆242Updated 4 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 5 years ago
- Reverse Shell Cheat Sheet TooL☆299Updated 5 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Updated 5 years ago
- APT34/OILRIG leak☆233Updated 6 years ago
- Network Pivoting Toolkit☆458Updated 2 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆269Updated 7 years ago
- Evading Anti-Virus with Unusual Technique☆216Updated 2 years ago
- Easy files and payloads delivery over DNS☆425Updated last year
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago
- Passwords Recovery Tool☆231Updated 4 years ago
- A polyglot payload generator☆242Updated 3 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Aggressor scripts I've made for Cobalt Strike☆413Updated 2 years ago
- Collection of Windows Hacking Binaries☆53Updated 10 years ago
- Rapid Attack Infrastructure (RAI)☆309Updated last year
- ☆298Updated 5 years ago
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆377Updated 9 months ago