ohanf / secat
Networking exploration in golang to build a security enhanced version of netcat
☆10Updated 7 years ago
Alternatives and similar repositories for secat:
Users that are interested in secat are comparing it to the libraries listed below
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆59Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Encryption Abstraction Layer and Utilities for ratnet☆18Updated 11 months ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Provides access to libhashcat☆30Updated last year
- DNS logging, detection, ...☆15Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Miscellaneous for various things☆20Updated 4 months ago
- ☆16Updated 4 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Modular rootkit framework.☆27Updated 4 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- The best way to send emails in Go.☆10Updated 4 years ago