orlyjamie / spinningcatView external linksLinks
☆94Jan 28, 2026Updated 2 weeks ago
Alternatives and similar repositories for spinningcat
Users that are interested in spinningcat are comparing it to the libraries listed below
Sorting:
- ☆16Dec 7, 2025Updated 2 months ago
- ☆17Jan 9, 2025Updated last year
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆41Jan 6, 2026Updated last month
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- ☆54Jan 21, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Jul 22, 2025Updated 6 months ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 7 months ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated 11 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 2 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated last month
- ☆31Dec 5, 2024Updated last year
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated last month
- Get some useful data from Clouds for your targets☆20Feb 1, 2026Updated 2 weeks ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated 11 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 7 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- ☆24Feb 1, 2025Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 10 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 9 months ago
- ☆79Aug 1, 2023Updated 2 years ago
- A Crystal Palace shared library to resolve & perform syscalls☆56Oct 29, 2025Updated 3 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆40Dec 2, 2025Updated 2 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 2 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Advanced In-Memory PowerShell Process Injection Framework☆72Jul 16, 2025Updated 7 months ago
- A BOF to enumerate system process, their protection levels, and more.☆124Nov 27, 2024Updated last year
- pysnaffler☆110Jan 6, 2026Updated last month
- The CAPTCHA-resilient contact scraper.☆45Nov 18, 2025Updated 2 months ago