adgaultier / caracalLinks
Make your programs stealthier🐝
☆198Updated 7 months ago
Alternatives and similar repositories for caracal
Users that are interested in caracal are comparing it to the libraries listed below
Sorting:
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆429Updated 3 months ago
- Speedy probe-based UDP service scanner☆116Updated 2 months ago
- An eBPF🐝 Keylogger with C2-based RCE payload delivery☆308Updated 8 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆104Updated 4 months ago
- Direct access to NTFS volumes☆292Updated 4 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆381Updated 5 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆121Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆133Updated 8 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 8 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 6 months ago
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆110Updated 7 months ago
- Protection against HTML smuggling attacks.☆101Updated 6 months ago
- Reaping treasures from strings in remote processes memory☆285Updated 11 months ago
- A fork of the Go language with some tweaks☆54Updated 11 months ago
- ☆163Updated 2 months ago
- Network Fuzzing Framework☆50Updated this week
- Rust Linux Kernel Module designed for LKM rootkit detection☆58Updated 10 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- Persist like a Dodder☆67Updated 8 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆431Updated 2 weeks ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- ☆95Updated 5 months ago
- io_uring based rootkit☆246Updated 8 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆252Updated 7 months ago
- C2 writen in Rust & Go powered by Tor network.☆155Updated 2 months ago
- Get root via TTY / TIOCSTI stuffing☆75Updated 8 months ago