emptymonkey / revsh
A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
☆465Updated 8 months ago
Alternatives and similar repositories for revsh:
Users that are interested in revsh are comparing it to the libraries listed below
- Hide processes as a normal user in Linux.☆254Updated 8 months ago
- A keystroke / terminal logger for Linux.☆216Updated 8 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- Tool for extracting information from newly spawned processes☆746Updated 3 years ago
- Payload development framework☆703Updated 2 weeks ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆312Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆746Updated 6 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆953Updated 4 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆256Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- Simple reverse ICMP shell☆134Updated 10 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆571Updated 10 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- A framework for Backdoor development!☆436Updated 6 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆635Updated last year
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆451Updated 8 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆362Updated 10 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆352Updated 6 years ago
- Explore the network using VPNPivot tool☆269Updated 8 years ago
- HTTP/S Beaconing Implant☆304Updated 7 years ago
- DNS-Shell is an interactive Shell over DNS channel☆523Updated 4 years ago
- A shellcode writing toolkit☆662Updated 2 years ago
- A PowerShell example of the Windows zero day priv esc☆324Updated 6 years ago