sysdream / hershellLinks
Hershell is a simple TCP reverse shell written in Go.
☆531Updated 6 years ago
Alternatives and similar repositories for hershell
Users that are interested in hershell are comparing it to the libraries listed below
Sorting:
- Multiplatform reverse shell generator☆590Updated 5 years ago
- Load shellcode into a new process☆773Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆463Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆783Updated last year
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,077Updated 3 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- A WebSocket C2 Tool☆401Updated 7 years ago
- Simple linux backdoors and hiding techniques☆213Updated 7 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- A proof of concept for the RDP Inception Attack☆348Updated 8 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆270Updated 2 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429Updated 3 years ago
- nextnet is a pivot point discovery tool written in Go.☆450Updated 4 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆623Updated 2 years ago
- ☆274Updated 4 years ago
- ☆298Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆379Updated 3 years ago
- An XSS reverse shell framework☆309Updated 6 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆447Updated 2 years ago
- Some useful scripts for CobaltStrike☆850Updated 4 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆345Updated 4 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆744Updated 8 years ago
- A super small jsp webshell with file upload capabilities.☆301Updated 3 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆750Updated 4 years ago
- Bluekeep(CVE 2019-0708) exploit released☆105Updated 5 years ago
- cve-2020-0688☆325Updated 2 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆544Updated 5 years ago