Cisco Config Analysis Tool
☆468Apr 23, 2023Updated 2 years ago
Alternatives and similar repositories for ccat
Users that are interested in ccat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Сollection of TCL scripts for Cisco IOS penetration testing☆68Jul 17, 2018Updated 7 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Aug 27, 2019Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Exchange privilege escalations to Active Directory☆810Apr 23, 2023Updated 2 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- NetSPI PowerShell Scripts☆344Feb 10, 2026Updated last month
- PowerShell MachineAccountQuota and DNS exploit tools☆1,443Jan 11, 2023Updated 3 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆737Feb 5, 2019Updated 7 years ago
- A curated list of awesome Cisco exploitation resources☆70Oct 7, 2017Updated 8 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Feb 15, 2024Updated 2 years ago
- ☆298Nov 9, 2020Updated 5 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆202Nov 8, 2020Updated 5 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,930Nov 19, 2025Updated 4 months ago
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆605Mar 2, 2021Updated 5 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 3 months ago
- Windows passwords decryption from dump files☆513Feb 2, 2023Updated 3 years ago