Invoke-KleptoKitty - Deploys Payloads and collects credentials
☆30Jul 28, 2021Updated 4 years ago
Alternatives and similar repositories for KleptoKitty
Users that are interested in KleptoKitty are comparing it to the libraries listed below
Sorting:
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Mar 21, 2018Updated 7 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 9 months ago
- Enable RDP and set firewall by Windows API.☆21Mar 3, 2022Updated 4 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 3 years ago
- HardeningKitty - Checks and hardens your Windows configuration☆1,744Dec 23, 2024Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- Take webcam snaps by sending malicious link☆14Jun 9, 2020Updated 5 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- This repository lists all active Microsoft domains | no URLs and no sub-domains | for the purpose of Whitelisting in various systems and …☆43Jan 8, 2026Updated last month
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- ☆12Feb 4, 2025Updated last year
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- ☆10Sep 3, 2021Updated 4 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated 2 weeks ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆89Aug 29, 2023Updated 2 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- Stoppin' it.☆22Jan 27, 2012Updated 14 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Dec 25, 2020Updated 5 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- ClickHeat by blade1o6 is a visual heatmap of clicks on a HTML page, showing hot and cold click zones☆19Jan 13, 2011Updated 15 years ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- ☆12Sep 15, 2025Updated 5 months ago
- Enter all information you have in the format that the cmd prompt asks for wait a short time(a few minutes) and you will receive all infor…☆10May 14, 2021Updated 4 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago