redcode-labs / RevsslLinks
A script that automates generation of OpenSSL reverse shells
☆302Updated 4 years ago
Alternatives and similar repositories for Revssl
Users that are interested in Revssl are comparing it to the libraries listed below
Sorting:
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆401Updated 7 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- XFLTReaT tunnelling framework☆329Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 2 years ago
- generate reverse shell from CLI for linux and Windows.☆247Updated 4 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Bash post exploitation toolkit☆737Updated 2 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆397Updated 5 years ago
- Static compiled binaries + scripts ready to use on systems☆153Updated 3 months ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- A collection of useful Serverless functions I use when pentesting☆388Updated 2 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆175Updated 7 years ago
- AI-based, context-driven network device ranking☆299Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆420Updated last month
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆183Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆546Updated 4 years ago