reverse shell using curl
☆478Apr 20, 2024Updated last year
Alternatives and similar repositories for curlshell
Users that are interested in curlshell are comparing it to the libraries listed below
Sorting:
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated last month
- Dominate Active Directory with PowerShell.☆1,164Nov 28, 2025Updated 2 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated last week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- yet another AV killer tool using BYOVD☆305Dec 12, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆614Jan 2, 2025Updated last year
- New generation of wmiexec.py☆1,254Jan 5, 2026Updated last month
- Protected Process Dumper Tool☆576Aug 30, 2023Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,771May 22, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,155Mar 28, 2025Updated 10 months ago
- Amsi Bypass payload that works on Windwos 11☆378Jul 30, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆814Mar 28, 2025Updated 11 months ago
- UAC Bypass By Abusing Kerberos Tickets☆508Aug 10, 2023Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- Tool to remotely dump secrets from the Windows registry☆522Nov 18, 2025Updated 3 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- ☆223Mar 10, 2024Updated last year
- SSH based reverse shell☆1,322Jan 27, 2026Updated last month
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- ☆341Nov 10, 2025Updated 3 months ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated last year
- HVNC for Cobalt Strike☆1,298Dec 7, 2023Updated 2 years ago
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,259Dec 9, 2025Updated 2 months ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆787Jan 9, 2025Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆79Feb 16, 2026Updated last week
- ☆2,198Nov 24, 2023Updated 2 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,408Jan 19, 2026Updated last month
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆245Mar 19, 2024Updated last year