ihack4falafel / ReverseShell
TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.
☆26Updated 5 years ago
Alternatives and similar repositories for ReverseShell:
Users that are interested in ReverseShell are comparing it to the libraries listed below
- ☆16Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- c# reverse shell poc☆26Updated 6 years ago
- AppXSVC Service race condition - privilege escalation☆27Updated 5 years ago
- (kinda) Malicious Outlook Reader☆18Updated 3 years ago
- ☆38Updated 6 years ago
- ☆31Updated 4 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated last month
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆59Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- ☆52Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 7 months ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- Get or remove RunMRU values☆53Updated 5 years ago
- Simple .NET assembly to interact with services.☆38Updated 5 years ago
- ☆45Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆35Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆11Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- ☆11Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago