mandiant / gocat
Provides access to libhashcat
☆29Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for gocat
- Rosie the Pivoter☆17Updated 6 years ago
- Network Finger Printer☆16Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆57Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- ☆33Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- ☆30Updated 6 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- ☆16Updated 4 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 5 years ago
- visually see issues with supported cipher suites☆15Updated 5 months ago
- Zone transfers for rwhois☆20Updated 5 years ago
- SSDP Service Discovery☆16Updated 5 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆30Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 2 years ago
- DNS server for pentesters☆48Updated 2 years ago
- Shellcode process injector☆27Updated 4 years ago
- CVE-2020-0688 PoC☆10Updated this week
- ☆31Updated 3 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago