☆24Jan 24, 2025Updated last year
Alternatives and similar repositories for GitRAT
Users that are interested in GitRAT are comparing it to the libraries listed below
Sorting:
- ☆18Jun 25, 2024Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆42Nov 22, 2025Updated 3 months ago
- ☆24Feb 18, 2025Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆56Jun 12, 2025Updated 8 months ago
- ☆28May 25, 2021Updated 4 years ago
- Crane POAM Automation Tool (C-PAT™)☆15Updated this week
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆78Dec 2, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- ☆34May 24, 2023Updated 2 years ago
- ☆50Jun 4, 2025Updated 8 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- ☆107Feb 12, 2025Updated last year
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- This is a blender file containing a number of design tools using Blender's Geometry Nodes. Also included are two addons to import an airf…☆15Apr 5, 2024Updated last year
- FedRAMP Documentation☆46Updated this week
- Compliance-to-Policy (C2P) provides the framework to bridge the gap between compliance and policy administration in Go.☆24Feb 23, 2026Updated last week
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- GitHub action that checks if there has been any new commit in a given time frame☆10Oct 1, 2024Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated last month
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- ☆14Jan 7, 2026Updated last month
- BYOVD Technique Example using viragt64 driver☆72Jul 25, 2024Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆41May 3, 2021Updated 4 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆64Jan 21, 2025Updated last year
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- Terraform modules for cloud.gov managed services☆14Updated this week
- SpecOps is a low-level, domain-specific language and compiler for crafting Ethereum VM bytecode. The project also includes a CLI with cod…☆16Aug 18, 2024Updated last year
- Redis RCE through Lua Sandbox Escape vulnerability☆10Sep 2, 2022Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- A reverse/bind shell generator utility☆11Jul 22, 2024Updated last year