evilsocket / shellzLinks
shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.
☆607Updated last year
Alternatives and similar repositories for shellz
Users that are interested in shellz are comparing it to the libraries listed below
Sorting:
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆401Updated 7 years ago
- Goca Scanner☆329Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆607Updated last year
- framework to rapidly implement custom droppers for all three major operating systems☆701Updated last year
- A manager for your secrets.☆954Updated last year
- zero-trust remote firewall instrumentation☆252Updated last year
- The best way to scan for weak ssh passwords on your network☆613Updated last year
- Declarative penetration testing orchestration framework☆291Updated 5 years ago
- Interactive Network Scanner☆1,030Updated 4 years ago
- A script that automates generation of OpenSSL reverse shells☆302Updated 5 years ago
- Bash post exploitation toolkit☆741Updated 2 years ago
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆541Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆620Updated last week
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆163Updated 2 years ago
- nextnet is a pivot point discovery tool written in Go.☆451Updated 2 months ago
- Open source offensive security platform for red team, by red team.☆387Updated 7 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆497Updated 10 months ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,073Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Modern tactical exploitation toolkit.☆852Updated last week
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆141Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆397Updated 5 years ago
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated last month
- Queue and resource system for cracking passwords☆388Updated 3 years ago
- Golang IPv6 address enumeration☆363Updated 6 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆480Updated last month
- Hawkeye filesystem analysis tool☆237Updated 7 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆524Updated 4 years ago