emptymonkey / revsh
A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
☆464Updated 7 months ago
Alternatives and similar repositories for revsh:
Users that are interested in revsh are comparing it to the libraries listed below
- Hide processes as a normal user in Linux.☆253Updated 7 months ago
- A keystroke / terminal logger for Linux.☆214Updated 7 months ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Tool for extracting information from newly spawned processes☆745Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- XFLTReaT tunnelling framework☆326Updated 5 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆743Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Updated 6 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- GTRS - Google Translator Reverse Shell☆616Updated 4 months ago
- Payload development framework☆701Updated this week
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆452Updated 8 years ago
- A PowerShell example of the Windows zero day priv esc☆324Updated 6 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆568Updated 10 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆379Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channel☆524Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆240Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆294Updated 7 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆636Updated last year
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆519Updated 3 years ago
- ☆603Updated 4 months ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Updated 9 years ago