pprugger / Cryptcat-1.3.0-Win-10-Release
Changed version of cryptcat which compiles on Windows 10
☆13Updated 7 years ago
Alternatives and similar repositories for Cryptcat-1.3.0-Win-10-Release:
Users that are interested in Cryptcat-1.3.0-Win-10-Release are comparing it to the libraries listed below
- ☆12Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- ☆17Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- ☆24Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- ☆16Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 10 months ago
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- ☆11Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- AppXSVC Service race condition - privilege escalation☆27Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- SSDP Service Discovery☆16Updated 6 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆17Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- ☆13Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last week