rek7 / postshell
PostShell - Post Exploitation Bind/Backconnect Shell
☆84Updated 5 years ago
Alternatives and similar repositories for postshell:
Users that are interested in postshell are comparing it to the libraries listed below
- KeyLogger for Linux Systems☆70Updated 3 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆79Updated last year
- An Insider Threat Toolkit☆149Updated 6 years ago
- ☆94Updated 6 years ago
- Ex-pv8's☆64Updated 5 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆74Updated 6 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆98Updated 7 years ago
- Tool aided persistence via Windows URI schemes abuse☆83Updated 4 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆229Updated last year
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆84Updated 5 years ago
- ☆129Updated last year
- An advanced graphical search engine for Exploit-DB☆117Updated 8 months ago
- ☆43Updated 5 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆101Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆97Updated 2 years ago
- ☆31Updated 4 years ago
- Domain fronting using Google app engine☆53Updated 6 years ago
- MS17-010☆63Updated 7 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Updated 5 years ago
- ☆59Updated 4 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago