nopcorn / CuteRAT
CuteRAT is a stealthy remote access tool without any dependencies
☆16Updated last year
Alternatives and similar repositories for CuteRAT:
Users that are interested in CuteRAT are comparing it to the libraries listed below
- fully async implementation of Dirkjan's ROADTools☆31Updated 2 weeks ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- ☆20Updated 3 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 8 months ago
- Async Python library to parse local and remote disk images.☆76Updated 2 weeks ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- Living Off the Foreign Land setup scripts☆67Updated last month
- pysnaffler☆91Updated 2 weeks ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- ☆54Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆25Updated 3 weeks ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆30Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆105Updated this week
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆76Updated 5 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated 10 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆69Updated 5 months ago
- Discord C2 Profile for Mythic☆28Updated last month
- tool for identifying guest relationships between companies☆84Updated 9 months ago
- Living off the land searches for explorer and sharepoint☆59Updated 5 months ago
- ☆68Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- ☆15Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Custom queries list for BloodHound☆23Updated 7 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 11 months ago
- Top hashpwn rules☆18Updated 4 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆38Updated last year
- Linux CS bypass technique☆30Updated 2 months ago
- ☆52Updated last week