Simple Powershell Http shell With WEB UI
☆74Mar 28, 2025Updated 11 months ago
Alternatives and similar repositories for ReHTTP
Users that are interested in ReHTTP are comparing it to the libraries listed below
Sorting:
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Iranian SMS And CALL Bomber Over 150 Api☆40Sep 5, 2022Updated 3 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆20Feb 10, 2026Updated last month
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- ☆41Sep 9, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated last week
- Encodes a payload within a generated mock-CSS file☆59Sep 18, 2023Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- Hidden RDP☆20Sep 20, 2024Updated last year
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆438Jan 29, 2026Updated last month
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Dec 17, 2024Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.☆122Feb 21, 2025Updated last year
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- ☆25Apr 28, 2024Updated last year