persistent-security / SMShellLinks
PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers
☆367Updated 2 years ago
Alternatives and similar repositories for SMShell
Users that are interested in SMShell are comparing it to the libraries listed below
Sorting:
- MultiPlatform HTTP Reverse Shell☆236Updated 8 months ago
- Windows And Ways To Break It☆100Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- A Linux persistence tool!☆153Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.☆220Updated 8 months ago
- Harvest passwords automatically from OpenSSH server☆373Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆766Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆389Updated 8 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆366Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆224Updated last year
- ☆543Updated last year
- Shodan Dorks 2023☆236Updated 4 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆132Updated 3 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆294Updated last year
- Search & Parse Password Leaks☆370Updated 8 months ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆387Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆430Updated last year
- Automated exploit scanner for cameras on the internet☆193Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆349Updated last year
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆383Updated last year
- The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.☆275Updated 3 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆139Updated 2 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆239Updated 8 months ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆400Updated 2 years ago
- Telegram Monitor☆347Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆381Updated 5 months ago
- PacketSpy☆155Updated last year
- PowerShell Obfuscator☆178Updated last year
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆257Updated 2 months ago