☆12Jun 27, 2019Updated 6 years ago
Alternatives and similar repositories for https-reverse-shell-golang
Users that are interested in https-reverse-shell-golang are comparing it to the libraries listed below
Sorting:
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 6 months ago
- This is a libary to mimic the functionallity of the linux shred command.☆15Dec 11, 2020Updated 5 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- Rex Shellcode Loader for AV/EDR evasion☆35Apr 7, 2024Updated last year
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- In this project a robot that can be operated by authorized person or operator is implemented. For this purpose we use a face re…☆12Jun 20, 2018Updated 7 years ago
- Plugin metademands for GLPI☆12Feb 20, 2026Updated last week
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆10Oct 9, 2024Updated last year
- A "reverse engineering" of the BYD CAN protocol when used with Victron/Venus OS☆16Feb 6, 2026Updated 3 weeks ago
- Using Raspberry Pi, Python, MQTT, Home Assistant, a relay, and a magnetic proximity sensor, I open, close, stop, and report the status of…☆11Nov 7, 2016Updated 9 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- plugin for osTicket to allow for tickets to be scheduled or to recurr☆10Apr 16, 2014Updated 11 years ago
- ISPConfig 3.1 for FreeBSD 11.1-RELEASE☆11Jun 29, 2019Updated 6 years ago
- building a pet ID scanner☆11Nov 1, 2021Updated 4 years ago
- Open source design for centrifugal air pump for open source ventilator☆10Apr 14, 2020Updated 5 years ago
- Simple Secure Network File System - Coming Soon☆12Sep 6, 2018Updated 7 years ago
- ☆10Nov 17, 2024Updated last year
- Get ALL of the AKER Kit source file packs. If you love them, don't forget to tell us about it - aaron@akerkits.com☆10May 24, 2017Updated 8 years ago
- ☆11Aug 23, 2022Updated 3 years ago
- ☆43Jan 2, 2023Updated 3 years ago
- Solutions for CSS Layout Exercises☆12Feb 5, 2021Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- ☆46Nov 5, 2025Updated 3 months ago
- A dead-simple, extensible logging framework for Python☆11Aug 4, 2021Updated 4 years ago
- Kanboard Comment-Only Restriction☆12Dec 12, 2018Updated 7 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Package and Run Virtual Machines as Docker Containers☆10Dec 9, 2015Updated 10 years ago
- Simple script with dependency on POSIX sh(1) to gather info from the running system. The result of the script is report-like HTML file wi…☆18Feb 15, 2026Updated last week
- Minimal web frontend for esniper, a lightweight eBay sniping tool☆10Dec 16, 2018Updated 7 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Things I wish were Go built-ins☆13Sep 29, 2020Updated 5 years ago
- The most reliable source of background screening records. A frequent automated update process ensures the reliability & availability of u…☆11Jun 20, 2018Updated 7 years ago