hackerschoice / hackshell
Make BASH stealthy and hacker friendly with lots of bash functions
☆221Updated last week
Alternatives and similar repositories for hackshell:
Users that are interested in hackshell are comparing it to the libraries listed below
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆240Updated 11 months ago
- ☆519Updated 9 months ago
- ☆227Updated 3 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆496Updated 2 weeks ago
- Lab used for workshop and CTF☆166Updated 3 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆216Updated 9 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆347Updated 9 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆541Updated 6 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆329Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆195Updated last month
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆349Updated this week
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆230Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆501Updated 5 months ago
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640☆109Updated last year
- A command and control framework written in rust.☆296Updated this week
- ☆281Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated 9 months ago
- ☆212Updated 3 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆135Updated 4 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆346Updated this week
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆248Updated 5 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆648Updated 5 months ago
- reverse shell using curl☆450Updated 8 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆312Updated 3 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆403Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆253Updated 3 months ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆445Updated 2 weeks ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆158Updated 7 months ago
- Harvest passwords automatically from OpenSSH server☆368Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆489Updated 2 months ago