mark-ruddy / catsploitLinks
An open-source modern exploitation framework inspired by Metasploit
☆18Updated last year
Alternatives and similar repositories for catsploit
Users that are interested in catsploit are comparing it to the libraries listed below
Sorting:
- Rust bindings to Microsoft Windows users / groups management API☆34Updated last month
- Interactive results explorer and annotation tool for Nosey Parker☆52Updated 7 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 3 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated 2 years ago
- ☆61Updated last month
- Rust in-memory dumper☆108Updated 2 years ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- POC for DLL Proxying / Hijacking☆63Updated 8 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 3 months ago
- Quick network scanner library. https://crates.io/crates/qscan☆91Updated 3 years ago
- Cloud Exploit Framework☆113Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 2 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Scans for indications of an XSS, Oracle SQLi and filters out words containing MySQL.☆28Updated 10 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 3 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- A command line Curses based json viewer and tabulator☆30Updated 6 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆40Updated 2 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Upload files done during my research.☆169Updated 2 months ago
- C2 Automation using Linode☆85Updated 3 years ago