☆53Feb 4, 2025Updated last year
Alternatives and similar repositories for raccoon
Users that are interested in raccoon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Burp Suite extension for testing Passkey systems.☆76Apr 1, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Addon for BHCE☆57Apr 1, 2025Updated last year
- ☆12Feb 23, 2015Updated 11 years ago
- ☆17Jan 9, 2025Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- ☆138Jan 16, 2025Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- ☆131Jun 28, 2023Updated 2 years ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆388Jan 23, 2025Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆192Apr 26, 2025Updated 11 months ago
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆38Apr 9, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- ☆19Jan 25, 2024Updated 2 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆45Apr 27, 2023Updated 2 years ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆59Jan 29, 2015Updated 11 years ago
- ☆37Mar 28, 2025Updated last year
- Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.☆24Oct 31, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- ☆12Jul 11, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- Dump document encryption password from Office process memory☆40Mar 27, 2023Updated 3 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆247Mar 19, 2024Updated 2 years ago