t3l3machus / hoaxshellLinks
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
☆3,361Updated 9 months ago
Alternatives and similar repositories for hoaxshell
Users that are interested in hoaxshell are comparing it to the libraries listed below
Sorting:
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,264Updated 5 months ago
- The Havoc Framework☆7,938Updated 4 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,643Updated 4 months ago
- The Network Execution Tool☆4,884Updated last week
- Codebase to generate an msdt-follina payload☆1,628Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,106Updated last week
- evilginx3 + gophish☆1,901Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,942Updated 7 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,368Updated 5 months ago
- Fancy reverse and bind shell handler☆2,835Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,037Updated 5 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,085Updated last month
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,894Updated 2 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,608Updated 11 months ago
- An XSS exploitation command-line interface and payload generator.☆1,399Updated 9 months ago
- Wi-Fi Exploitation Framework☆2,622Updated last month
- Privilege Escalation Enumeration Script for Windows☆3,522Updated last month
- A tool to perform Kerberos pre-auth bruteforcing☆3,108Updated last year
- A collaborative, multi-platform, red teaming framework☆4,074Updated last week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,760Updated last month
- Automation for internal Windows Penetrationtest / AD-Security☆3,588Updated 2 months ago
- Fully featured and community-driven hacking environment☆2,649Updated 2 weeks ago
- Starkiller is a Frontend for PowerShell Empire.☆1,572Updated 2 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,332Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,468Updated 3 years ago
- Adversary Emulation Framework☆10,185Updated last week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,118Updated 2 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,228Updated last month
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,789Updated 5 months ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,545Updated 4 years ago