ngn13 / ezcat
an easy interface for managing multiple linux & windows TCP reverse shells
☆13Updated last month
Alternatives and similar repositories for ezcat:
Users that are interested in ezcat are comparing it to the libraries listed below
- ☆9Updated last month
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Recon (Whois)☆15Updated last year
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- ☆10Updated 7 years ago
- ☆15Updated last year
- HTTP based framework for building command and control components for remote access trojans☆14Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆12Updated 2 weeks ago
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆17Updated 3 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆38Updated 3 weeks ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 3 weeks ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 4 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆15Updated 11 months ago
- A powerful reverse shell generator☆44Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 6 months ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 10 months ago
- API hooking and code injection made easy!☆36Updated last year
- x86_64 LKM linux rootkit☆16Updated last year