pprugger / Cryptcat-1.3.0-Win-10-ReleaseLinks
Changed version of cryptcat which compiles on Windows 10
☆22Updated 7 years ago
Alternatives and similar repositories for Cryptcat-1.3.0-Win-10-Release
Users that are interested in Cryptcat-1.3.0-Win-10-Release are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated 2 years ago
- ☆18Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆14Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated last year
- Bypass Windows Defender with py2exe from memory.☆38Updated 3 years ago
- Custom pentesting tools☆25Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆22Updated 3 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- ☆25Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- ☆33Updated 10 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- ☆17Updated 3 years ago