ohanf / secat
Networking exploration in golang to build a security enhanced version of netcat
☆10Updated 7 years ago
Alternatives and similar repositories for secat
Users that are interested in secat are comparing it to the libraries listed below
Sorting:
- Provides access to libhashcat☆30Updated last year
- Rosie the Pivoter☆17Updated 6 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Modular rootkit framework.☆27Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- ☆16Updated 5 years ago
- rev shell and manager in go☆20Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 6 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Shellcode process injector☆27Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆11Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago