DominicBreuker / goncatLinks
netcat-like CLI tool with advanced features for bind/reverse shells
☆19Updated 3 months ago
Alternatives and similar repositories for goncat
Users that are interested in goncat are comparing it to the libraries listed below
Sorting:
- A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET☆59Updated 2 months ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆53Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Updated 3 years ago
- gRPC client for the Merlin Server☆27Updated 9 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago
- ☆89Updated 2 years ago
- ☆56Updated 9 months ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Updated last month
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Updated last year
- Abusing SSRF to deliver an authenticated command injection payload☆30Updated 5 months ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Updated 3 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated 2 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆55Updated 3 years ago
- Pre-Auth Exploit for CVE-2024-40711☆55Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- Dump Linux keyrings☆23Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated 2 years ago
- C# havoc implant☆100Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated last year
- ☆59Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Updated last year
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆52Updated last year