mark-ruddy / catsploitLinks
An open-source modern exploitation framework inspired by Metasploit
☆18Updated 11 months ago
Alternatives and similar repositories for catsploit
Users that are interested in catsploit are comparing it to the libraries listed below
Sorting:
- Rust bindings to Microsoft Windows users / groups management API☆33Updated last year
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆27Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- Rust Weaponization for Red Team Engagements.☆27Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated last year
- Unicode Security Toolkit☆36Updated 8 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- Cloud Exploit Framework☆114Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- A distributed network mapper/security scanner.☆16Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Remote Command executor☆77Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated 2 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated 11 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- A DMARC scanning and parsing tool.☆33Updated 2 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- aws cli pentesting/red team snippets☆32Updated last year
- External recon toolkit☆50Updated 5 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Signing-key abuse and update exploitation framework☆129Updated last month