ohanf / secat
Networking exploration in golang to build a security enhanced version of netcat
☆10Updated 7 years ago
Alternatives and similar repositories for secat:
Users that are interested in secat are comparing it to the libraries listed below
- Rosie the Pivoter☆17Updated 6 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆59Updated 6 years ago
- Provides access to libhashcat☆30Updated 11 months ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- ☆33Updated 4 years ago
- ☆16Updated 4 years ago
- Shellcode process injector☆27Updated 4 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 3 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago