shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.
☆612Jul 13, 2024Updated last year
Alternatives and similar repositories for shellz
Users that are interested in shellz are comparing it to the libraries listed below
Sorting:
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆163Dec 22, 2022Updated 3 years ago
- A manager for your secrets.☆960Jul 13, 2024Updated last year
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆17Jul 12, 2018Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆536Jun 5, 2022Updated 3 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,291Jul 10, 2024Updated last year
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- 🧠 A tool that makes AI easier.☆298Jun 17, 2024Updated last year
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17May 8, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- A fast and secure multi protocol honeypot.☆327Sep 9, 2022Updated 3 years ago
- A specialized database server for linear algebra and machine learning.☆88Feb 25, 2023Updated 3 years ago
- The Swiss Army knife for backend engineers.☆95Mar 12, 2021Updated 4 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆795May 18, 2020Updated 5 years ago
- caplets and proxy modules.☆513Apr 1, 2025Updated 10 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- zero-trust remote firewall instrumentation☆256Jan 19, 2026Updated last month
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- 🧠✈️ An ergo based project that relies on a convolutional neural network to detect airplanes from satellite imagery.☆45May 20, 2019Updated 6 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,803Updated this week
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Jun 6, 2022Updated 3 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,504Apr 17, 2025Updated 10 months ago
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 9 months ago
- Open source offensive security platform for red team, by red team.☆384Oct 23, 2017Updated 8 years ago
- A fully functional DanderSpritz lab in 2 commands☆447May 16, 2019Updated 6 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆787Jun 23, 2022Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆755Nov 18, 2021Updated 4 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,556Oct 17, 2022Updated 3 years ago
- UAC bypass, Elevate, Persistence methods☆2,739Feb 13, 2023Updated 3 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,307Jan 31, 2022Updated 4 years ago