t3l3machus / hoaxshell
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
☆3,044Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for hoaxshell
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,807Updated 2 weeks ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,055Updated 2 weeks ago
- The Havoc Framework☆6,860Updated this week
- The Network Execution Tool☆3,274Updated this week
- Wi-Fi Exploitation Framework☆2,399Updated 2 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,261Updated last week
- The ultimate WinRM shell for hacking/pentesting☆4,542Updated 3 weeks ago
- Codebase to generate an msdt-follina payload☆1,614Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,824Updated last week
- Generates millions of keyword-based password mutations in seconds.☆1,165Updated 3 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,337Updated 9 months ago
- Adversary Emulation Framework☆8,553Updated last week
- game of active directory☆5,429Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,678Updated last month
- ☆2,158Updated last year
- Arsenal is just a quick inventory and launcher for hacking programs☆3,204Updated last month
- Monitor linux processes without root permissions☆4,961Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,167Updated 5 months ago
- An XSS exploitation command-line interface and payload generator.☆1,268Updated 3 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆2,820Updated 2 weeks ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆1,979Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,850Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆2,672Updated 3 months ago
- A script that you can run in the background!☆2,732Updated 3 months ago
- Privilege Escalation Enumeration Script for Windows☆2,982Updated last week
- Windows Exploit Suggester - Next Generation☆4,230Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,337Updated 11 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,026Updated last year
- A swiss army knife for pentesting networks☆8,457Updated 11 months ago
- Fancy reverse and bind shell handler☆2,647Updated 3 months ago