calebstewart / pwncat-windows-c2View external linksLinks
pwncat windows c2 components
☆22Jun 21, 2021Updated 4 years ago
Alternatives and similar repositories for pwncat-windows-c2
Users that are interested in pwncat-windows-c2 are comparing it to the libraries listed below
Sorting:
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- A Python API for Hack the Box platform interaction☆64Nov 27, 2020Updated 5 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Sep 16, 2013Updated 12 years ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 3 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 8 months ago
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆54Jan 25, 2022Updated 4 years ago
- Password Recovery Toolkit For Windows Written in Python 3☆25Oct 2, 2023Updated 2 years ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Github repository which contains a functional exploit for CVE-2021-39165☆22Jul 13, 2022Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆289Jan 31, 2021Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- CTF toolbox☆22Apr 2, 2023Updated 2 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 4 months ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Jul 24, 2021Updated 4 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Apr 30, 2025Updated 9 months ago
- PowerShell script to generate user accounts in Active Directory for a test lab environment☆31Oct 21, 2018Updated 7 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Feb 14, 2023Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆114Apr 16, 2016Updated 9 years ago
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- ☆39Apr 23, 2024Updated last year
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 7 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Jun 4, 2019Updated 6 years ago