hackerschoice / hackshell
Make BASH stealthy and hacker friendly with lots of bash functions
☆199Updated last week
Related projects ⓘ
Alternatives and complementary repositories for hackshell
- Lab used for workshop and CTF☆156Updated last month
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆240Updated 3 months ago
- ☆493Updated 7 months ago
- ☆280Updated 11 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆154Updated 5 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆343Updated 7 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆116Updated 3 weeks ago
- Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protection…☆265Updated 3 weeks ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆516Updated 4 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆134Updated 2 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆239Updated 9 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆112Updated 5 months ago
- Different methods to get current username without using whoami☆172Updated 9 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆283Updated last month
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆159Updated 2 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆338Updated 2 months ago
- ☆191Updated last month
- Azure mindmap for penetration tests☆161Updated last year
- ☆180Updated last month
- Everything and anything related to password spraying☆126Updated 6 months ago
- Tool to remotely dump secrets from the Windows registry☆401Updated 3 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆248Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆402Updated 3 months ago
- Nameless C2 - A C2 with all its components written in Rust☆241Updated last month
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆466Updated 3 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆228Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆196Updated last week