mthbernardes / GTRSLinks
GTRS - Google Translator Reverse Shell
☆615Updated 7 months ago
Alternatives and similar repositories for GTRS
Users that are interested in GTRS are comparing it to the libraries listed below
Sorting:
- Public work for CVE-2019-0708☆292Updated 5 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆410Updated 5 years ago
- Tool for extracting information from newly spawned processes☆757Updated 3 weeks ago
- Orc is a post-exploitation framework for Linux written in Bash☆394Updated 5 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆522Updated 3 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆387Updated 6 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆601Updated last year
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Some of my exploits.☆582Updated 4 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆646Updated 5 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆401Updated 4 years ago
- A collection of useful Serverless functions I use when pentesting☆386Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆377Updated 3 years ago
- An XSS reverse shell framework☆308Updated 6 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆921Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,062Updated 5 years ago
- Script to steal passwords from ssh.☆480Updated 6 years ago
- HTA encryption tool for RedTeams☆1,397Updated 2 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- A WebSocket C2 Tool☆397Updated 7 years ago
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆669Updated 6 years ago