The SSH Multiplex Backdoor Tool
☆65Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for SSHession
Users that are interested in SSHession are comparing it to the libraries listed below
Sorting:
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated last month
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- ☆33Aug 10, 2019Updated 6 years ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Mar 2, 2020Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Mar 31, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- Keylogger written in C#☆125Dec 13, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Exploits, Exploits, Exploits and more Exploits!☆34Nov 7, 2020Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Jan 11, 2025Updated last year
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- ☆198Mar 19, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- ☆399Jan 7, 2026Updated last month
- ☆165May 1, 2019Updated 6 years ago
- ☆30Apr 24, 2019Updated 6 years ago