adgaultier / caracalView external linksLinks
Make your programs stealthier🐝
☆201Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for caracal
Users that are interested in caracal are comparing it to the libraries listed below
Sorting:
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 3 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 5 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Aug 31, 2025Updated 5 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated 3 weeks ago
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- ☆43Jul 17, 2025Updated 6 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆165Sep 22, 2025Updated 4 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆388Aug 18, 2025Updated 5 months ago
- Direct access to NTFS volumes☆292Sep 9, 2025Updated 5 months ago
- Group Policy Objects manipulation and exploitation framework☆289Dec 7, 2025Updated 2 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- Sleep Obfuscation in Rust☆277Dec 1, 2025Updated 2 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Persist like a Dodder☆67May 19, 2025Updated 8 months ago
- Security tool against dependency typosquatting attacks☆54Feb 9, 2026Updated last week
- Seamless remote browser session control☆225Jan 28, 2026Updated 2 weeks ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- A cmake template for crystal palace☆38Dec 20, 2025Updated last month
- ☆30Oct 13, 2025Updated 4 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- Generate Proxy DLLs in Rust☆47Sep 2, 2025Updated 5 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆500Oct 3, 2025Updated 4 months ago
- Random BOFs for LDAP tradecraft☆72Sep 9, 2025Updated 5 months ago
- DLL proxying for lazy people☆198Dec 1, 2025Updated 2 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆283Dec 6, 2025Updated 2 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆220Jun 4, 2025Updated 8 months ago
- single-threaded event driven sleep obfuscation poc for linux☆37Jun 14, 2025Updated 8 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆310Feb 8, 2026Updated last week
- eBPF Memory Dump Tool☆99Aug 26, 2025Updated 5 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 weeks ago
- Enumerate active EDR's on the system☆150Sep 23, 2025Updated 4 months ago