mark-ruddy / catsploitLinks
An open-source modern exploitation framework inspired by Metasploit
☆18Updated last year
Alternatives and similar repositories for catsploit
Users that are interested in catsploit are comparing it to the libraries listed below
Sorting:
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- Rust bindings to Microsoft Windows users / groups management API☆34Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 3 years ago
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- Interactive results explorer and annotation tool for Nosey Parker☆41Updated 5 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 5 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 6 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆89Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Cloud Exploit Framework☆114Updated 3 years ago
- A Rust-based dropper for shellcode payloads.☆68Updated 8 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- A DMARC scanning and parsing tool.☆33Updated 7 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆21Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 2 months ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 8 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago