Collection of reverse shells for red team operations.
☆533Mar 17, 2025Updated last year
Alternatives and similar repositories for OffensiveReverseShellCheatSheet
Users that are interested in OffensiveReverseShellCheatSheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for HackMyVM platform☆19May 28, 2023Updated 2 years ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆87Jun 20, 2025Updated 9 months ago
- Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.☆52Mar 24, 2025Updated last year
- improving...☆258Oct 14, 2025Updated 5 months ago
- Red Team Cheatsheet in constant expansion.☆1,267Dec 28, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits☆188Jun 5, 2025Updated 9 months ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆528Feb 27, 2026Updated 3 weeks ago
- A curated list of awesome privilege escalation☆1,525Updated this week
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,509Nov 21, 2025Updated 4 months ago
- OSCP Cheat Sheet☆3,669Mar 18, 2026Updated last week
- Active Directory Auditing and Enumeration☆521Dec 3, 2025Updated 3 months ago
- PowerShell scripts for communicating with a remote host.☆302Apr 27, 2023Updated 2 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,646Jul 27, 2025Updated 7 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,447Mar 11, 2026Updated 2 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,159May 13, 2023Updated 2 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,197Jan 20, 2023Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,157Mar 8, 2026Updated 2 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,943Jan 28, 2026Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,366Feb 15, 2026Updated last month
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,701Jul 6, 2025Updated 8 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆677Oct 23, 2025Updated 5 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,555Feb 20, 2026Updated last month
- ☆14Nov 15, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,549Jan 18, 2026Updated 2 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,874Dec 25, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆601Sep 24, 2025Updated 6 months ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,643Aug 29, 2025Updated 6 months ago
- The Network Execution Tool☆5,356Updated this week
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,914Jun 27, 2023Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,434Jan 19, 2025Updated last year
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆302Jan 1, 2026Updated 2 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- Assist reverse tcp shells in post-exploration tasks☆220Oct 17, 2025Updated 5 months ago
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆828Dec 15, 2025Updated 3 months ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,013Nov 7, 2021Updated 4 years ago
- Real-world infosec wordlists, updated regularly☆1,725Updated this week
- Windows Local Privilege Escalation Cookbook☆1,287Feb 5, 2026Updated last month