reverse shell using curl
☆476Apr 20, 2024Updated last year
Alternatives and similar repositories for curlshell
Users that are interested in curlshell are comparing it to the libraries listed below
Sorting:
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated 2 months ago
- Amsi Bypass payload that works on Windwos 11☆379Jul 30, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,170Nov 28, 2025Updated 3 months ago
- New generation of wmiexec.py☆1,269Jan 5, 2026Updated 2 months ago
- ☆342Nov 10, 2025Updated 4 months ago
- Protected Process Dumper Tool☆583Aug 30, 2023Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆618Jan 2, 2025Updated last year
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆741May 19, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Updated this week
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,171Mar 28, 2025Updated 11 months ago
- yet another AV killer tool using BYOVD☆306Dec 12, 2023Updated 2 years ago
- ☆223Mar 10, 2024Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,782May 22, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated 11 months ago
- The swiss army knife of LSASS dumping☆2,081Sep 17, 2024Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,828Nov 3, 2024Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆538Nov 14, 2025Updated 4 months ago
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated 3 weeks ago
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆385Apr 26, 2025Updated 10 months ago
- HVNC for Cobalt Strike☆1,304Dec 7, 2023Updated 2 years ago
- Repository to store exploits created by Assetnotes Security Research team☆182Nov 7, 2023Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated 2 years ago
- An IIS short filename enumeration tool☆1,131Nov 25, 2024Updated last year
- RunPE implementation with multiple evasive techniques (1)☆383Sep 22, 2023Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆816Mar 31, 2024Updated last year
- ☆79Aug 2, 2023Updated 2 years ago
- ☆2,205Nov 24, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆79Mar 7, 2026Updated last week
- ☆234Nov 13, 2024Updated last year