seriotonctf / shellcatLinks
☆18Updated last year
Alternatives and similar repositories for shellcat
Users that are interested in shellcat are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Detect common NFS server misconfigurations☆95Updated 8 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 7 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆117Updated 6 months ago
- ☆94Updated last year
- ☆120Updated 8 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆51Updated 2 years ago
- ☆106Updated 11 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Updated 9 months ago
- Everything and anything related to password spraying☆151Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- ☆79Updated 9 months ago
- ☆36Updated last year
- LDAP Enumeration Tool for Pentesters☆48Updated 9 months ago
- Most Responder's configuration power in your hand.☆52Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆130Updated 10 months ago
- Simple netexec wraper with html repport☆19Updated last year
- ☆75Updated 10 months ago
- ☆63Updated 2 years ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆76Updated last month
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆77Updated this week
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- ☆62Updated last month
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- Decrypt Chromium based browser passwords with PowerShell.☆131Updated 2 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆140Updated 5 months ago