Reverse shell using go
☆38Feb 21, 2019Updated 7 years ago
Alternatives and similar repositories for rev2go
Users that are interested in rev2go are comparing it to the libraries listed below
Sorting:
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆12Dec 27, 2023Updated 2 years ago
- SIP Tools☆14Sep 15, 2016Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Tool for dictionary attack with fail2ban bypass.☆16Jan 8, 2022Updated 4 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- My solutions to RingZer0 CTF programming challenges☆15Aug 15, 2016Updated 9 years ago
- OS X-like gestures for GNOME Shell using TouchEgg☆15May 5, 2017Updated 8 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- ☆48Mar 19, 2020Updated 5 years ago
- PPID Spoofing☆19Dec 26, 2020Updated 5 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Multiplatform reverse shell generator☆592Mar 26, 2020Updated 5 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- A module for the WiFi Pineapple to facilitate the PMKID attack.☆55Apr 18, 2022Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆242May 5, 2023Updated 2 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- Penetration testing on windows(7 or 8)☆25Oct 21, 2020Updated 5 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Apr 8, 2025Updated 10 months ago
- Process injection techniques written in Go.☆64Jul 1, 2023Updated 2 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- execute a PE in the address space of another PE aka process hollowing☆60Dec 2, 2021Updated 4 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- ☆38Mar 4, 2020Updated 6 years ago
- golang amsi bypass☆30Dec 4, 2021Updated 4 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- Pipal, THE password analyser☆661Aug 27, 2023Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- checkO365 is a tool to check if a target domain is using O365☆87Jun 11, 2018Updated 7 years ago
- ☆10Feb 27, 2026Updated last week
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago