praetorian-inc / glatoView external linksLinks
GitLab Attack TOolkit
☆34Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for glato
Users that are interested in glato are comparing it to the libraries listed below
Sorting:
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Jul 31, 2025Updated 6 months ago
- ☆19Sep 15, 2021Updated 4 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆30Feb 2, 2026Updated 2 weeks ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 8, 2026Updated last week
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆117Sep 2, 2025Updated 5 months ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Fast Windows post-exploitation wins after initial access.☆28Jan 28, 2026Updated 2 weeks ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 4 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 2 years ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆388Aug 18, 2025Updated 5 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ☆21Sep 12, 2025Updated 5 months ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- ☆24Sep 26, 2021Updated 4 years ago
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 3 months ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- Cross Compatible Command and Control☆46Dec 18, 2025Updated last month
- Secretly record audio and video with chromium based browsers.☆23Feb 14, 2024Updated 2 years ago
- ☆37Nov 25, 2025Updated 2 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago