xct / xcLinks
A small reverse shell for Linux & Windows
☆620Updated last year
Alternatives and similar repositories for xc
Users that are interested in xc are comparing it to the libraries listed below
Sorting:
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,168Updated 2 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆647Updated 4 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆657Updated 5 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- An script to perform kerberos bruteforcing by using impacket☆455Updated 3 years ago
- Linux PAM Backdoor☆357Updated 2 years ago
- ☆220Updated 5 years ago
- Windows Local Privilege Escalation from Service Account to System☆880Updated 5 years ago
- Windows AV Evasion☆818Updated 5 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆518Updated 2 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆396Updated last year
- ☆295Updated 4 years ago
- ☆218Updated 5 years ago
- ☆164Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,278Updated 2 months ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆379Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆1,138Updated 4 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆397Updated 4 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆928Updated 3 years ago
- PowerShell scripts for communicating with a remote host.☆305Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆284Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆822Updated 2 months ago
- ☆742Updated 10 months ago
- Pentester's Promiscuous Notebook☆523Updated 2 weeks ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆583Updated 3 months ago
- Standalone binaries for Linux/Windows of Impacket's examples☆741Updated 2 years ago
- Simple php reverse shell implemented using binary .☆428Updated 2 years ago
- Powershell tool to automate Active Directory enumeration.☆1,255Updated 2 months ago
- The Hunt for Malicious Strings☆1,323Updated 6 months ago
- Proof of Concept for CVE-2019-18634☆232Updated 4 years ago