AdnaneKhan / CacheractLinks
GitHub Actions Cache Native Malware - for Educational and Research Purposes only.
☆66Updated 2 months ago
Alternatives and similar repositories for Cacheract
Users that are interested in Cacheract are comparing it to the libraries listed below
Sorting:
- Java archive implant toolkit.☆61Updated 2 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆48Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆114Updated 3 weeks ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 8 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆198Updated 2 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆85Updated 2 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 9 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- Addon for BHCE☆47Updated 2 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- Persist like a Dodder☆61Updated last month
- Cloud subdomains identification tool☆59Updated 2 months ago
- ☆64Updated last month
- ☆53Updated 5 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- ☆161Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- .NET deserialization hunter☆77Updated 11 months ago
- Burp Suite extension for testing Passkey systems.☆69Updated 2 months ago
- OAuth Device Code Phishing Toolkit☆61Updated 2 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- ☆182Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆166Updated 3 weeks ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆155Updated last week
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 9 months ago
- Azure Post Exploitation Framework☆200Updated 3 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆117Updated 2 months ago