Chimera VS ConPtyShell

Compare Chimera vs ConPtyShell and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
Chimera ConPtyShell
3 3
1,260 913
- -
0.0 0.0
over 2 years ago over 1 year ago
PowerShell PowerShell
- MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

Chimera

Posts with mentions or reviews of Chimera. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-09-24.

ConPtyShell

Posts with mentions or reviews of ConPtyShell. We have used some of these posts to build our list of alternatives and similar projects.
  • Powershell doesn't work in my netcat reverse shell
    1 project | /r/oscp | 3 Jun 2021
    The console/tty support in Windows is not....great. This has only been changing in recent Windows 10 versions. You can run into issues a lot if whatever app you are running does more than basic i/o. One thing you may want to try out is ConPtyShell. It will let you create a much nicer reverse shell experience on newer Windows 10 targets.
  • ConPtyShell - Fully Interactive Reverse Shell for Windows :
    1 project | /r/Ethical_Hackers | 28 Mar 2021
  • Tips for Windows fully interactive shell
    1 project | /r/oscp | 13 Jan 2021
    For the longest time, the Windows console just...wasn't very good. It didn't have the kind of PTY support that Linux, etc. had. This has changed in more recent versions of Windows 10, as part of WSL improvements. There is at least one package, ConPtyShell, that takes advantage of this for bind/reverse shell use. Other than that, there is not a whole lot else.

What are some alternatives?

When comparing Chimera and ConPtyShell you can also consider the following projects:

ThreatCheck - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.

terminalizer - 🦄 Record your terminal and generate animated gif images or share a web player

BetterXencrypt - A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.

nishang - Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

lscript - The LAZY script will make your life easier, and of course faster.

Terminal-Icons - A PowerShell module to show file and folder icons in the terminal

pixload - Image Payload Creating/Injecting tools

DotFetch - An alternative to NeoFetch on Windows

DefenderCheck - Identifies the bytes that Microsoft Defender flags on.

PoshC2 - A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

Create-Thread-Shellcode-Fetcher - This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.

vulnerable-AD - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab