GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (+155.26%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-18.42%)
GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (+92.11%)
GirshAutomatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (+73.68%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (+26.32%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+1118.42%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+1063.16%)
java-reverse-tcpJAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 19 (-50%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+15768.42%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (+131.58%)
php-reverse-shellPHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (+621.05%)
Reverse-Shell-ClientThe reverse shell client is a Python based alternative for a netcat reverse shell listener
Stars: ✭ 19 (-50%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (+128.95%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (+123.68%)
Print My ShellPython script wrote to automate the process of generating various reverse shells.
Stars: ✭ 140 (+268.42%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+921.05%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (+326.32%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+402.63%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-7.89%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+1000%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+1852.63%)
atermIt records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-55.26%)
ReverseShellDllC++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Stars: ✭ 69 (+81.58%)
KnockOutlookA little tool to play with Outlook
Stars: ✭ 188 (+394.74%)
k0otkitk0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Stars: ✭ 217 (+471.05%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+18.42%)
fofa viewer一个简单实用的FOFA客户端 By flashine
Stars: ✭ 815 (+2044.74%)
BCA-PhantomA multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
Stars: ✭ 80 (+110.53%)
tor-rootkitA Python 3 standalone Windows 10 / Linux Rootkit using Tor.
Stars: ✭ 142 (+273.68%)
ConsolePiRaspberry Pi Based Serial Console Server, with PushBullet Notification of IP changes, Automatic VPN termination, custom menu, Power Outlet Control, and a lot more
Stars: ✭ 109 (+186.84%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+313.16%)
shellbinThe source code of https://rshell.dev
Stars: ✭ 22 (-42.11%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-2.63%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+107.89%)
rsReverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp
Stars: ✭ 37 (-2.63%)
DecoyMini🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Stars: ✭ 213 (+460.53%)
GoRATGoRAT (Go Remote Access Tool) is an extremely powerful reverse shell, file server, and control plane using HTTPS reverse tunnels as a transport mechanism.
Stars: ✭ 34 (-10.53%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+9676.32%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+57.89%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (+23.68%)
BlueReverseBluetooth reverse shell.
Stars: ✭ 15 (-60.53%)
SLibSLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#
Stars: ✭ 50 (+31.58%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-2.63%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-42.11%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (+47.37%)
AutoWinAutowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
Stars: ✭ 18 (-52.63%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-7.89%)
DNSExplorerBash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (-13.16%)
MudDungeonJSA mud engine using telnet and Web sockets for web built with NodeJs
Stars: ✭ 21 (-44.74%)