AdnaneKhan / CacheractLinks
GitHub Actions Cache Native Malware - for Educational and Research Purposes only.
☆69Updated last month
Alternatives and similar repositories for Cacheract
Users that are interested in Cacheract are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆93Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 7 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆91Updated last month
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆101Updated 3 weeks ago
- ☆71Updated last month
- ☆86Updated 2 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 11 months ago
- ☆164Updated 5 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆34Updated 3 weeks ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆80Updated 6 months ago
- A cross platform library to write offensive and defensive security tools in Go☆122Updated last month
- Cloud subdomains identification tool☆60Updated 5 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆107Updated 2 months ago
- Addon for BHCE☆53Updated 6 months ago
- ☆115Updated 3 weeks ago
- Java archive implant toolkit.☆61Updated 5 months ago
- ☆35Updated 5 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 2 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆214Updated 5 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- Persist like a Dodder☆64Updated 4 months ago
- Tools for attacking Azure Function Apps☆83Updated 11 months ago
- ☆75Updated 2 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆72Updated 2 months ago
- ☆54Updated 8 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 10 months ago