emptymonkey / revsh
A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
☆458Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for revsh
- Hide processes as a normal user in Linux.☆255Updated 4 months ago
- A keystroke / terminal logger for Linux.☆212Updated 4 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- Payload development framework☆568Updated this week
- HORSEPILL rootkit PoC☆223Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆737Updated 5 years ago
- Powershell VNC injector☆332Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆687Updated 6 years ago
- Explore the network using VPNPivot tool☆268Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆723Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆559Updated 9 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆945Updated 3 years ago
- A PowerShell example of the Windows zero day priv esc☆321Updated 6 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆256Updated 3 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- XFLTReaT tunnelling framework☆326Updated 4 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- Tool for extracting information from newly spawned processes☆735Updated 2 years ago
- GTRS - Google Translator Reverse Shell☆616Updated last month
- Automated Linux evil maid attack☆420Updated 8 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- ☆596Updated last month
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆632Updated last year
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆448Updated 8 years ago
- Repository holding all alternatives of *nix backdoors.☆154Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆486Updated 3 years ago
- A shellcode writing toolkit☆661Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 5 years ago