emptymonkey / revsh
A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
☆464Updated 9 months ago
Alternatives and similar repositories for revsh:
Users that are interested in revsh are comparing it to the libraries listed below
- Tool for extracting information from newly spawned processes☆751Updated 3 years ago
- Hide processes as a normal user in Linux.☆255Updated 9 months ago
- A keystroke / terminal logger for Linux.☆215Updated 9 months ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆956Updated 4 years ago
- HORSEPILL rootkit PoC☆226Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆748Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 9 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- Automated Linux evil maid attack☆427Updated 9 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 6 months ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆450Updated 8 years ago
- A WebSocket C2 Tool☆393Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆784Updated last year
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆295Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆241Updated 8 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆573Updated 10 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Payload development framework☆736Updated 2 weeks ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆520Updated 3 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆639Updated last year
- BEURK Experimental Unix RootKit☆382Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 5 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆210Updated 9 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆363Updated 10 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago