CuteRAT is a stealthy remote access tool without any dependencies
☆17Sep 12, 2023Updated 2 years ago
Alternatives and similar repositories for CuteRAT
Users that are interested in CuteRAT are comparing it to the libraries listed below
Sorting:
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Dec 19, 2025Updated 2 months ago
- Eating 2FA for Breakfast☆57Nov 2, 2022Updated 3 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- ☆31Sep 23, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Feb 13, 2022Updated 4 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Golang search engine scraper intended for identification of published ClickOnce deployments☆91Nov 19, 2024Updated last year
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Jun 27, 2024Updated last year
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- ☆15Sep 4, 2024Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆47Jan 31, 2024Updated 2 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆63Jan 10, 2025Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆11Dec 22, 2020Updated 5 years ago