A reverse shell for Windows and Linux written in C.
☆89May 8, 2022Updated 3 years ago
Alternatives and similar repositories for c-reverse-shell
Users that are interested in c-reverse-shell are comparing it to the libraries listed below
Sorting:
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A tool to tunnel TCP traffic over WinRM☆18Jul 15, 2021Updated 4 years ago
- ☆22Mar 14, 2024Updated 2 years ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆37Aug 5, 2025Updated 7 months ago
- Windows API Hashes used in the malwares☆42Aug 7, 2015Updated 10 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- Nameless C2 - A C2 with all its components written in Rust☆284Sep 26, 2024Updated last year
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- DRILL (Distributable Remote Integrated Lightweight Link) is a powerful and stealthy Command and Control (C2) framework designed for seaml…☆34Jul 31, 2025Updated 7 months ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 9 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- A Rust-based dropper for shellcode payloads.☆72Mar 21, 2025Updated 11 months ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 9 months ago
- Zero-dependency MCP server implementation.☆74Feb 23, 2026Updated 3 weeks ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆147Jul 17, 2025Updated 8 months ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Linux kernel integrity monitor for detecting syscall hooking☆81Feb 16, 2026Updated last month
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Simple Project that Extracts PE Information.☆22Apr 4, 2025Updated 11 months ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Jan 7, 2019Updated 7 years ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Python library for parsing AccessData AD1 images☆34Jun 1, 2023Updated 2 years ago
- ☆29Aug 24, 2025Updated 6 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Personal Notes for Reversing Research(sometimes for Security)☆59Dec 30, 2021Updated 4 years ago