reverse shell using curl
☆475Apr 20, 2024Updated 2 years ago
Alternatives and similar repositories for curlshell
Users that are interested in curlshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Real fucking shellcode encryptor & obfuscator tool☆1,024Jan 7, 2026Updated 3 months ago
- Amsi Bypass payload that works on Windwos 11☆381Jul 30, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,182Nov 28, 2025Updated 5 months ago
- New generation of wmiexec.py☆1,282Apr 26, 2026Updated last week
- ☆346Nov 10, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Protected Process Dumper Tool☆590Aug 30, 2023Updated 2 years ago
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆625Jan 2, 2025Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆743May 19, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆912Apr 24, 2026Updated last week
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆375Mar 24, 2026Updated last month
- UAC Bypass By Abusing Kerberos Tickets☆508Aug 10, 2023Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Slack bot phishing framework for Red Teaming exercises☆165Apr 27, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,824May 22, 2024Updated last year
- yet another AV killer tool using BYOVD☆312Dec 12, 2023Updated 2 years ago
- ☆224Mar 10, 2024Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆404Sep 14, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆537Nov 14, 2025Updated 5 months ago
- Tool to remotely dump secrets from the Windows registry☆527Feb 27, 2026Updated 2 months ago
- Spartacus DLL/COM Hijacking Toolkit☆1,079Feb 1, 2024Updated 2 years ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆388Apr 26, 2025Updated last year
- HVNC for Cobalt Strike☆1,323Dec 7, 2023Updated 2 years ago
- Repository to store exploits created by Assetnotes Security Research team☆181Nov 7, 2023Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆593Mar 19, 2024Updated 2 years ago
- RunPE implementation with multiple evasive techniques (1)☆386Sep 22, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An IIS short filename enumeration tool☆1,153Nov 25, 2024Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- ☆2,257Nov 24, 2023Updated 2 years ago
- ☆235Nov 13, 2024Updated last year
- Fileless Command Execution for Lateral Movement in Nim☆393Apr 4, 2026Updated last month