malwarekid / OnlyShellLinks
A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type detection, background management, command broadcasting, and real-time interaction.
☆54Updated last week
Alternatives and similar repositories for OnlyShell
Users that are interested in OnlyShell are comparing it to the libraries listed below
Sorting:
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆195Updated 2 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆90Updated last week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆96Updated 2 months ago
- ☆163Updated this week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- Vast.ai Password Kracking☆89Updated 3 weeks ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆128Updated 7 months ago
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 7 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆73Updated 2 weeks ago
- IPSpinner works as a local proxy that redirects requests through external services.☆106Updated 8 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆144Updated last month
- Our Tips&Tricks☆127Updated 9 months ago
- ☆78Updated 6 months ago
- C2 writen in Rust & Go powered by Tor network.☆148Updated 3 weeks ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆249Updated 6 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆108Updated last year
- sl0ppy-PrivescTaskCreator.ps1☆37Updated last month
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆94Updated this week
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 5 months ago
- ☆65Updated last year
- The different ways to dump lsass☆195Updated 3 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Updated 10 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year