evilsocket / shellz
shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.
☆572Updated 6 months ago
Alternatives and similar repositories for shellz:
Users that are interested in shellz are comparing it to the libraries listed below
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆685Updated 10 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆591Updated 7 months ago
- Goca Scanner☆330Updated last year
- GTRS - Google Translator Reverse Shell☆616Updated 3 months ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆398Updated 7 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆354Updated 3 months ago
- Hawkeye filesystem analysis tool☆234Updated 6 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆488Updated last month
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆518Updated 5 years ago
- nextnet is a pivot point discovery tool written in Go.☆446Updated 4 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆451Updated 3 weeks ago
- Open source offensive security platform for red team, by red team.☆382Updated 7 years ago
- Gorsair gives root access on remote docker containers that expose their APIs☆852Updated last year
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- A mostly-serverless distributed hash cracking platform☆799Updated 9 months ago
- Declarative penetration testing orchestration framework☆290Updated 5 years ago
- The best way to scan for weak ssh passwords on your network☆609Updated last year
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆159Updated 2 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆132Updated last year
- A powerful target reconnaissance framework powered by graph theory.☆422Updated 2 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆109Updated 6 years ago
- Modern tactical exploitation toolkit.☆839Updated 6 months ago
- Interactive Network Scanner☆1,013Updated 4 years ago
- Bash post exploitation toolkit☆723Updated last year
- An XSS reverse shell framework☆304Updated 6 years ago
- Script to steal passwords from ssh.☆476Updated 6 years ago