emptymonkey / revsh
A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
☆464Updated 8 months ago
Alternatives and similar repositories for revsh:
Users that are interested in revsh are comparing it to the libraries listed below
- Hide processes as a normal user in Linux.☆254Updated 8 months ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 5 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆256Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- A PowerShell example of the Windows zero day priv esc☆324Updated 6 years ago
- A shellcode writing toolkit☆662Updated 3 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆746Updated 6 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆490Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- A keystroke / terminal logger for Linux.☆216Updated 8 months ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Payload development framework☆708Updated last month
- Tool for extracting information from newly spawned processes☆746Updated 3 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆571Updated 10 years ago
- ☆716Updated 4 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- Powershell VNC injector☆334Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Updated 7 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆368Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆523Updated 4 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆451Updated 8 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆362Updated 10 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆745Updated last year