SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interface to the remote webshells.
☆75Nov 6, 2016Updated 9 years ago
Alternatives and similar repositories for subshell
Users that are interested in subshell are comparing it to the libraries listed below
Sorting:
- ☆174Jan 31, 2018Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Nov 19, 2024Updated last year
- SMB Named Pipe shell☆69Nov 19, 2024Updated last year
- initial commit☆44Nov 19, 2024Updated last year
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆366Nov 19, 2024Updated last year
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆251Nov 19, 2024Updated last year
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆611Jan 30, 2023Updated 3 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Fuzzapi is a tool used for REST API pentesting and uses Fuzzapi gem☆15May 30, 2022Updated 3 years ago
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- initial commit☆174Jun 11, 2018Updated 7 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆956Nov 18, 2020Updated 5 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 7 months ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- ☆182Feb 21, 2022Updated 4 years ago
- Generates anti-sandbox analysis HTA files without payloads☆121Mar 16, 2017Updated 9 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- Web based shell with configurable authentication☆15Apr 3, 2016Updated 9 years ago
- OpenSSH 6.7p1 backdoor kit☆21Oct 23, 2014Updated 11 years ago