ReverShellGenerator - A tool to generate various ways to do a reverse shell
☆567May 3, 2024Updated last year
Alternatives and similar repositories for rsg
Users that are interested in rsg are comparing it to the libraries listed below
Sorting:
- Privilege Escalation Project - Windows / Linux / Mac☆2,602Oct 4, 2024Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,854Dec 25, 2023Updated 2 years ago
- Pop shells like a master.☆1,489Apr 2, 2019Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,992Oct 10, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,659Nov 28, 2020Updated 5 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,184Dec 11, 2022Updated 3 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Micro$oft Windows Hacking Pack☆525Mar 6, 2018Updated 8 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,766Feb 27, 2026Updated last week
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,807Feb 23, 2026Updated last week
- Payload Generation Framework☆1,972Aug 21, 2024Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,961Jan 28, 2023Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,847Sep 6, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,901Jan 24, 2024Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,003Jan 15, 2019Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,914Apr 13, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- ODAT: Oracle Database Attacking Tool☆1,742Jul 27, 2024Updated last year
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- JAWS - Just Another Windows (Enum) Script☆1,919Apr 19, 2021Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- Post Exploitation Collection☆1,570May 1, 2020Updated 5 years ago
- A tool to elevate privilege with Windows Tokens☆1,062Oct 6, 2023Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Run PowerShell command without invoking powershell.exe☆1,534Mar 23, 2023Updated 2 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago