redcode-labs / Bashark
Bash post exploitation toolkit
☆730Updated last year
Alternatives and similar repositories for Bashark:
Users that are interested in Bashark are comparing it to the libraries listed below
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆518Updated 3 years ago
- Red Team Tool Kit☆1,119Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆763Updated 4 years ago
- Tool for extracting information from newly spawned processes☆751Updated 3 years ago
- HTA encryption tool for RedTeams☆1,387Updated 2 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆694Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆574Updated 9 months ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,270Updated 3 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆283Updated 2 months ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆572Updated 5 years ago
- Modern tactical exploitation toolkit.☆846Updated 9 months ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆711Updated 6 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,126Updated 4 years ago
- Pop shells like a master.☆1,455Updated 6 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,060Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 11 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆975Updated 7 years ago
- PowerShell ReverseTCP Shell - Framework☆1,051Updated 2 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,121Updated 4 months ago
- A WebSocket C2 Tool☆393Updated 7 years ago
- Multiplatform reverse shell generator☆587Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆801Updated 2 weeks ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆573Updated 10 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 6 months ago
- Smart Install Exploitation Tool☆577Updated 3 years ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- Tricks for penetration testing☆577Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 5 years ago