mzfr / rshView external linksLinks
generate reverse shell from CLI for linux and Windows.
☆248Sep 17, 2020Updated 5 years ago
Alternatives and similar repositories for rsh
Users that are interested in rsh are comparing it to the libraries listed below
Sorting:
- ☆17Jan 28, 2020Updated 6 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Python automation of Docker.sock abuse☆211Dec 8, 2022Updated 3 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Feb 25, 2021Updated 4 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Reverse Shell Cheat Sheet TooL☆300May 9, 2020Updated 5 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- TotalRecon installs all the recon tools you need☆465Jul 3, 2020Updated 5 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Sep 9, 2021Updated 4 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A script that automates generation of OpenSSL reverse shells☆303Sep 24, 2020Updated 5 years ago
- Search gtfobins and lolbas files from your terminal☆462Jul 13, 2022Updated 3 years ago
- Pop shells like a master.☆1,488Apr 2, 2019Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,594Jul 10, 2023Updated 2 years ago
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆743Nov 18, 2020Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆760Sep 23, 2024Updated last year
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆293Aug 23, 2019Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Dec 4, 2017Updated 8 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 5 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago