Obfuscated Invoke-Mimikatz script
☆13May 29, 2018Updated 7 years ago
Alternatives and similar repositories for Obf-Cats
Users that are interested in Obf-Cats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Jan 3, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.☆20Mar 11, 2024Updated 2 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Remote agent used for processing distributed jobs☆15Dec 15, 2021Updated 4 years ago
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Jul 20, 2025Updated 8 months ago
- ☆30Aug 19, 2020Updated 5 years ago
- ☆38Oct 12, 2020Updated 5 years ago
- A cool web interface to manage rules for naxsi☆19Dec 16, 2016Updated 9 years ago
- no-bullshit url shortening with node.js☆10Jan 11, 2023Updated 3 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MacOS Shared Library to Shellcode Loader☆63Feb 23, 2026Updated last month
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Automatic VLAN configuration tool for Linux☆25Jan 24, 2019Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Database interaction layer to store the Open Asset Model in a database management system☆22Mar 17, 2026Updated last week
- Basic network port scanner created in C#☆19Aug 1, 2019Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- ☆125Jun 28, 2023Updated 2 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- Small utility that leverages eBPF to dump the traffic of a unix domain socket☆20Sep 25, 2021Updated 4 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69May 7, 2016Updated 9 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- A maubot plugin that disrupts monologues cat pictures.☆18Feb 27, 2026Updated 3 weeks ago