A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type detection, background management, command broadcasting, and real-time interaction.
☆66Feb 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for OnlyShell
Users that are interested in OnlyShell are comparing it to the libraries listed below
Sorting:
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 5 months ago
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆49Jan 9, 2026Updated 2 months ago
- A deep dive into CVE-2025-49706 — the SharePoint spoofing flaw now exploited in the wild for stealthy web shell deployment and privilege …☆18Jul 20, 2025Updated 8 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 6 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- ☆42Oct 10, 2025Updated 5 months ago
- Real-time and historical visualization of US hydrology☆12Jun 23, 2015Updated 10 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 3 months ago
- BOF to steal Teams cookies☆124Nov 2, 2025Updated 4 months ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆30Oct 26, 2025Updated 4 months ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆168Sep 22, 2025Updated 5 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆40Mar 3, 2026Updated 2 weeks ago
- Ease PCB assembly with 3D printed jigs☆20Jul 3, 2025Updated 8 months ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 3 months ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆52Mar 13, 2026Updated last week
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 8 months ago
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Infinity can get phone numbers from facebook accounts with some maths and sht.☆13Feb 13, 2018Updated 8 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 3 months ago
- Simple personal blog/portfolio theme for Hugo☆10Nov 9, 2024Updated last year
- A Pentester's Powershell Client☆51Nov 23, 2025Updated 3 months ago
- ☆13Aug 24, 2024Updated last year
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago