hoaxshell
BSD-2-Clause๐ฅ Offensive Ops ยท Python
Hoaxshell is an unconventional Windows reverse shell that uses HTTP(S) traffic for communication, designed to be fully undetectable by Microsoft Defender. Developed in Python, it leverages web-based traffic to evade traditional detection mechanisms, making it suitable for stealthy penetration testing and red team activities. Hoaxshell is notable for its unique approach to bypassing endpoint security solutions.
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- Python
- Repository
- t3l3machus/hoaxshell
- License
- BSD-2-Clause
- Platforms
- ๐งlinux๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
More in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.