h3xduck / TCPcannonLinks
Offensive Linux tool for network attacks. Built from the ground with only C.
☆15Updated 4 years ago
Alternatives and similar repositories for TCPcannon
Users that are interested in TCPcannon are comparing it to the libraries listed below
Sorting:
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Enumeration & fingerprint tool☆25Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Simple and efficient file shredding☆14Updated 5 years ago
- ☆11Updated 3 months ago
- CVE-2023-20273 Exploit PoC☆11Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- A collection of my presentation materials.☆17Updated last year
- lightweight http redirector written in nim☆11Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago
- ☆18Updated 7 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆12Updated 4 years ago
- ☆12Updated 3 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆25Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆16Updated last month
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year