AdnaneKhan / CacheractLinks
GitHub Actions Cache Native Malware - for Educational and Research Purposes only.
☆65Updated last month
Alternatives and similar repositories for Cacheract
Users that are interested in Cacheract are comparing it to the libraries listed below
Sorting:
- Simple C2 using GitHub repository as comms channel.☆31Updated 7 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆110Updated 3 weeks ago
- Java archive implant toolkit.☆60Updated last month
- ☆158Updated last month
- OAuth Device Code Phishing Toolkit☆60Updated last month
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆51Updated 2 weeks ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆224Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 2 months ago
- Persist like a Dodder☆60Updated 2 weeks ago
- Artifact monitoring that ensures fairplay☆75Updated 4 months ago
- Cloud subdomains identification tool☆58Updated last month
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆188Updated last month
- A cross platform library to write offensive and defensive security tools in Go☆81Updated last week
- ☆90Updated this week
- ☆85Updated 4 months ago
- Azure Post Exploitation Framework☆199Updated 3 months ago
- Addon for BHCE☆45Updated 2 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆176Updated last month
- Tool to extract username and password of current user from PanGPA in plaintext☆84Updated 5 months ago
- Generate and Manage KeyCredentialLinks☆158Updated 3 weeks ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Your Skyfall Infrastructure Pack☆71Updated 2 weeks ago
- A simple POC to expose Mythic as a MCP server☆61Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆261Updated 3 months ago
- Covert data exfiltration via DNS☆45Updated 3 months ago
- ☆64Updated last month
- ☆191Updated 8 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 8 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated last month