mthbernardes / GTRSLinks
GTRS - Google Translator Reverse Shell
☆615Updated 8 months ago
Alternatives and similar repositories for GTRS
Users that are interested in GTRS are comparing it to the libraries listed below
Sorting:
- Public work for CVE-2019-0708☆292Updated 5 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Tool for extracting information from newly spawned processes☆759Updated last month
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆523Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated last year
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Some of my exploits.☆586Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 6 years ago
- A PowerShell example of the Windows zero day priv esc☆327Updated 6 years ago
- Search for categorized domain☆446Updated 6 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆696Updated 4 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆670Updated 6 years ago
- An XSS reverse shell framework☆308Updated 6 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆572Updated 5 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆924Updated 4 years ago
- A collection of useful Serverless functions I use when pentesting☆387Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆577Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- DNS Rebinding Exploitation Framework☆490Updated 4 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆401Updated 4 years ago
- Freedom Fighting Mode: open source hacking harness☆338Updated last year
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,071Updated 3 years ago
- A fully functional DanderSpritz lab in 2 commands☆428Updated 6 years ago