mzfr / rsh
generate reverse shell from CLI for linux and Windows.
☆245Updated 4 years ago
Alternatives and similar repositories for rsh:
Users that are interested in rsh are comparing it to the libraries listed below
- Python automation of Docker.sock abuse☆211Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- TotalRecon installs all the recon tools you need☆461Updated 4 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆418Updated 5 months ago
- Hamburglar -- collect useful information from urls, directories, and files☆317Updated 2 years ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆616Updated 4 months ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆400Updated 3 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- A collection of useful Serverless functions I use when pentesting☆383Updated 2 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- Web-based reverse shell generator☆172Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- A wrapper for Nmap to quickly run network scans☆146Updated 4 years ago
- For all your network pentesting needs☆152Updated 7 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆282Updated last week
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆532Updated 2 years ago
- Public work for CVE-2019-0708☆290Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Reverse Shell Cheat Sheet TooL☆292Updated 4 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆573Updated 5 years ago
- A simple embedded Linux backdoor.☆195Updated 4 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆370Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- A framework for stealthy domain reconnaissance☆298Updated 3 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆225Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆594Updated 3 years ago