GitLab Attack TOolkit
☆34Oct 8, 2025Updated 6 months ago
Alternatives and similar repositories for glato
Users that are interested in glato are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆54Jul 31, 2024Updated last year
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Apr 10, 2026Updated last week
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- ☆19Sep 15, 2021Updated 4 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆115Feb 21, 2023Updated 3 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆413Aug 18, 2025Updated 8 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 4 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆345Mar 21, 2026Updated 3 weeks ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 3 weeks ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 2 months ago
- A practical client for ADWS in Golang.☆50Mar 3, 2026Updated last month
- ☆78Jan 1, 2026Updated 3 months ago
- PoC XLL builder in Python/Nim☆50Nov 21, 2022Updated 3 years ago
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆160Jul 22, 2025Updated 8 months ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 4 months ago
- Objective C dylibHijackScanner and analysis tool☆40Jul 12, 2023Updated 2 years ago
- ☆40Nov 25, 2025Updated 4 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- ☆38Apr 15, 2025Updated last year
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- A delicious, but malicious SSL-VPN server 🌮☆266Feb 27, 2026Updated last month
- Chrome browser extension-based Command & Control☆258Mar 18, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 8 months ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 8 months ago
- Toolkit to weaponize Chromium vulnerabilities into reliable, cross-platform, full-chain exploits☆291Mar 23, 2026Updated 3 weeks ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Secretly record audio and video with chromium based browsers.☆24Feb 14, 2024Updated 2 years ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 7 months ago