CVE-2013-4786 Go exploitation tool
☆40Nov 18, 2025Updated 3 months ago
Alternatives and similar repositories for CosmicRakp
Users that are interested in CosmicRakp are comparing it to the libraries listed below
Sorting:
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- ☆18Oct 28, 2025Updated 4 months ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- pysnaffler☆110Jan 6, 2026Updated last month
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated last month
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆112Dec 11, 2023Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- ☆168Feb 29, 2024Updated 2 years ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- Click Once + App Domain☆64Feb 23, 2026Updated last week
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- Python tool to interact with WMI StdRegProv☆60Nov 19, 2024Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆414May 29, 2024Updated last year
- A simple tool for detecting memory modifications to Windows API.☆23Jan 9, 2025Updated last year
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago