irsl / curlshellLinks
reverse shell using curl
☆457Updated last year
Alternatives and similar repositories for curlshell
Users that are interested in curlshell are comparing it to the libraries listed below
Sorting:
- Kraken, a modular multi-language webshell coded by @secu_x11☆544Updated last year
- A library for detecting known secrets across many web frameworks☆651Updated last week
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆372Updated last month
- ↕️🤫 Stealth redirector for your red team operation security☆691Updated 10 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆267Updated 3 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆358Updated last month
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆207Updated 2 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆442Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆558Updated last year
- Windows remote execution multitool☆563Updated 2 weeks ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆524Updated 2 months ago
- ☆530Updated 11 months ago
- Session Hijacking Visual Exploitation☆200Updated last year
- Black box fuzzer for web applications☆427Updated 11 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆387Updated this week
- Kubernetes exploitation tool☆360Updated 11 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆299Updated last year
- Automated learning of regexes for DNS discovery☆370Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Updated 5 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆264Updated 2 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆71Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆160Updated 6 months ago
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆206Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆577Updated 7 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆597Updated last month
- Harvest passwords automatically from OpenSSH server☆373Updated 2 years ago
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆821Updated last year
- reverse shell using curl☆206Updated 4 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆719Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆231Updated last year