nettitude / raccoonView external linksLinks
☆53Feb 4, 2025Updated last year
Alternatives and similar repositories for raccoon
Users that are interested in raccoon are comparing it to the libraries listed below
Sorting:
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- ☆12Feb 23, 2015Updated 10 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- ☆18Jan 31, 2025Updated last year
- ☆17Jan 9, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A PoC for Early Cascade process injection technique.☆208Jan 30, 2025Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆379Jan 23, 2025Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 10 months ago
- ☆38Mar 28, 2025Updated 10 months ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- ☆126Jun 28, 2023Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆245Mar 19, 2024Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆61Sep 23, 2023Updated 2 years ago
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Sniffing files generator☆61Feb 24, 2025Updated 11 months ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆260Nov 22, 2025Updated 2 months ago
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆70Oct 30, 2024Updated last year
- ☆139Jan 16, 2025Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Apr 27, 2023Updated 2 years ago
- Stage 0☆169Dec 18, 2024Updated last year
- ☆137Nov 17, 2025Updated 3 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago