Go reverse shell for Win/Linux/OSX
☆17May 15, 2019Updated 6 years ago
Alternatives and similar repositories for go-revshell
Users that are interested in go-revshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Simple reverse and bind shells written in Go.☆31Sep 27, 2022Updated 3 years ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆18Oct 8, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- My NixOS system configuration☆14Feb 24, 2024Updated 2 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- ☆10Aug 11, 2025Updated 7 months ago
- Everyone is John is one of the shortest, most fun Table-Top/Pen-&-Paper Role-Playing Game (RPG) around.☆16Sep 23, 2018Updated 7 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 10 months ago
- AstroCrypt is a powerful and versatile tool designed to assist you in both cracking hashed passwords and identifying the hash type used t…☆17Oct 26, 2023Updated 2 years ago
- PE file format reader in JavaScript☆26Apr 10, 2019Updated 6 years ago
- A simple HTTP load balancer and reverse proxy written in Go.☆27Jan 27, 2020Updated 6 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- tinyCA2☆17Aug 29, 2015Updated 10 years ago
- ☆23Oct 13, 2025Updated 5 months ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆23Oct 31, 2024Updated last year
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Golang port of pefile☆25Jul 17, 2017Updated 8 years ago
- Non rebasing M token alternative with additional possibility to preserve and forward yield to earners☆13Feb 13, 2026Updated last month
- DynamoDB library for single-table design in Rust☆31Jun 30, 2023Updated 2 years ago
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆13Jan 21, 2021Updated 5 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Fast, Lightweight Pub/Sub over TCP, QUIC - powered by Async I/O☆21Jun 15, 2021Updated 4 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Sep 29, 2025Updated 5 months ago
- Repository of samples for scenarios enabled by API connectors for Azure AD B2C 'built-in' user flows.☆24Dec 10, 2022Updated 3 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- Control Raspberry Pi from browser☆19Nov 2, 2014Updated 11 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- A Simple Password Protected Back Door written in Python3☆21Jul 1, 2023Updated 2 years ago