irsl / curlshell
reverse shell using curl
☆452Updated 10 months ago
Alternatives and similar repositories for curlshell:
Users that are interested in curlshell are comparing it to the libraries listed below
- Kraken, a modular multi-language webshell coded by @secu_x11☆534Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆663Updated 6 months ago
- Kubernetes exploitation tool☆362Updated 7 months ago
- Harvest passwords automatically from OpenSSH server☆368Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆507Updated 6 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆200Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆542Updated this week
- A library for detecting known secrets across many web frameworks☆595Updated 2 weeks ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆350Updated last month
- ☆517Updated 8 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆57Updated 10 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆347Updated this week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆243Updated last year
- ☆516Updated last year
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆802Updated last year
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆258Updated last year
- ☆531Updated 11 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆429Updated last year
- Session Hijacking Visual Exploitation☆196Updated 11 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆335Updated 3 months ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆424Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆522Updated 3 months ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆483Updated 2 months ago
- Fuzz 401/403/404 pages for bypasses☆293Updated 2 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆561Updated 8 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆514Updated 11 months ago
- ☆406Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆567Updated 8 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆353Updated last month
- i will upload more templates here to share with the comunity.☆541Updated 10 months ago