diljith369 / reversehellgoLinks
rev shell and manager in go
☆20Updated 5 years ago
Alternatives and similar repositories for reversehellgo
Users that are interested in reversehellgo are comparing it to the libraries listed below
Sorting:
- AV Bypass☆29Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆13Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Plaform independent reverse shell over https☆11Updated 5 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 6 months ago
- Enumerate RIDs using pure Python☆31Updated 9 months ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- ☆16Updated 10 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- ☆1Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Random source codes☆25Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago
- ☆25Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago