Best Token2Shell Alternatives (22)

Looking for a Token2Shell alternative? We've compiled the best options based on user reviews, features, and pricing to help you find the right fit.

What is Token2Shell? Token2Shell is an open-source tool that allows attackers to escalate privileges and execute code on remote servers by abusing authentication tokens or keys. It can be used for penetration testing with permission.

Top Alternatives to Token2Shell

OpenSSH

OpenSSH

Open Source

OpenSSH is a free and open source suite of network connectivity tools for remote login and other secure network services …

MobaXterm is a free remote desktop application and SSH client for Windows. It includes terminal emulators, SSH, Xserver, network tools …

KiTTY

KiTTY

Free

KiTTY is an enhanced fork of PuTTY, the popular open-source Telnet and SSH client. KiTTY adds several features like transparency …

Bitvise SSH Client is a secure SSH and SFTP client for Windows. It supports SSH protocols 1 and 2, SFTP, …

SecureCRT is a terminal emulator program for Windows that provides secure remote access, file transfer, and data tunneling. It supports …

ExtraPuTTY

ExtraPuTTY

Open Source

ExtraPuTTY is an enhanced version of PuTTY, the popular open-source SSH and telnet client. It adds additional features like tabbed …

PuTTY

PuTTY

Open Source

PuTTY is a popular open-source terminal emulator and SSH client for Windows. Developed by Simon Tatham, PuTTY provides a lightweight …

FireSSH

FireSSH

Open Source

FireSSH is an SSH client that runs as a Firefox add-on, allowing you to access SSH servers directly from within …

JuiceSSH is an SSH client app for Android that allows you to securely connect to Linux or Unix servers, routers, …

MTPuTTY is a free and open source SSH and telnet client for Windows, which adds tabbed interface support to the …

More Similar Software

Token2Shell Overview

Token2Shell is an open-source command line tool written in Golang that generates reverse shells and payload executors by abusing authentication tokens or API keys. It works by using access tokens, API keys, or assumed role keys to invoke AWS API calls for unsigned S3 access. This allows attackers to exploit misconfigurations and improperly scoped permissions to escalate privileges and execute arbitrary code on EC2 instances, Lambda functions, and more.Token2Shell provides an easy way for penetration testers and security researchers to …

Pricing: Open Source

Quick Comparison

SoftwarePricingScore
Token2ShellOpen Source
OpenSSHOpen Source
MobaXtermN/A
KiTTYFree
Bitvise SSH ClientN/A
SecureCRTN/A
ExtraPuTTYOpen Source
PuTTYOpen Source
FireSSHOpen Source
JuiceSSHN/A
MTPuTTY (Multi-Tabbed PuTTY)Open Source

Read full Token2Shell review → | Browse Security-Privacy software