Cisco Config Analysis Tool
☆469Apr 23, 2023Updated 2 years ago
Alternatives and similar repositories for ccat
Users that are interested in ccat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Сollection of TCL scripts for Cisco IOS penetration testing☆68Jul 17, 2018Updated 7 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Aug 27, 2019Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Exchange privilege escalations to Active Directory☆811Apr 23, 2023Updated 2 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- NetSPI PowerShell Scripts☆345Feb 10, 2026Updated 2 months ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,450Jan 11, 2023Updated 3 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆736Feb 5, 2019Updated 7 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- A curated list of awesome Cisco exploitation resources☆70Oct 7, 2017Updated 8 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆179Sep 11, 2023Updated 2 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,451Nov 20, 2025Updated 4 months ago
- ☆298Nov 9, 2020Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆205Feb 15, 2024Updated 2 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆202Nov 8, 2020Updated 5 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,942Nov 19, 2025Updated 4 months ago
- ☆18Sep 22, 2018Updated 7 years ago
- Active Directory ACL exploitation with BloodHound☆760Nov 18, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆605Mar 2, 2021Updated 5 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,604Oct 4, 2024Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,626Dec 13, 2025Updated 4 months ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago