Invoke-KleptoKitty - Deploys Payloads and collects credentials
☆30Jul 28, 2021Updated 4 years ago
Alternatives and similar repositories for KleptoKitty
Users that are interested in KleptoKitty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- HardeningKitty - Checks and hardens your Windows configuration☆1,754Dec 23, 2024Updated last year
- PowerShell module for Invoking DSC from json☆17Dec 28, 2017Updated 8 years ago
- This repository lists all active Microsoft domains | no URLs and no sub-domains | for the purpose of Whitelisting in various systems and …☆44Jan 8, 2026Updated 2 months ago
- Heavily customized PowerShell profile.☆19Feb 21, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Mar 21, 2018Updated 8 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- A TUI to explore Pester results.☆23Aug 18, 2025Updated 7 months ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- ☆13Sep 17, 2025Updated 6 months ago
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆123Nov 9, 2023Updated 2 years ago
- ☆12Jan 16, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆89Aug 29, 2023Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆12Feb 17, 2022Updated 4 years ago
- A collection of unrelated PowerShell scripts☆18Sep 10, 2021Updated 4 years ago
- Minimalist Xargs for Windows☆10Dec 5, 2017Updated 8 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Sep 23, 2021Updated 4 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 5 months ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Feb 24, 2022Updated 4 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago