Caprico1 / kinsing
Docker kinsing malware bitcoin/xmr miner
☆22Updated 4 years ago
Alternatives and similar repositories for kinsing:
Users that are interested in kinsing are comparing it to the libraries listed below
- Simple golang reverse shell☆21Updated 5 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last week
- The best way to send emails in Go.☆10Updated 4 years ago
- React UI☆11Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆11Updated last year
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- post exploitation user monitoring tool☆20Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- ☆16Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆19Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Simple SSH vulnerability scanner based on SSH Harvester☆13Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Work in Progress repo☆14Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago