tomdaley92 / win-cat
NetCat for Windows
☆11Updated 7 years ago
Alternatives and similar repositories for win-cat:
Users that are interested in win-cat are comparing it to the libraries listed below
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆19Updated last year
- Collection of IDA helpers☆15Updated 2 years ago
- LSASS Credential Dumper that utilizes the Windows API, in-memory RC4 encryption and Base64 encoding, and HTTPS exfiltration.☆10Updated last year
- Collection of ezine about virii☆16Updated 2 years ago
- D00☆6Updated 3 years ago
- Local Privilege Escalation Miner☆25Updated 2 years ago
- A tiny Windows hook library for x86/x64☆14Updated last year
- A wrapper around Windows, calls explicitly the lowest possible calls☆12Updated 2 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- Recursively extract urls from a web page for reconnaissance.☆12Updated 8 months ago
- VBScript minifier☆24Updated last month
- ☆10Updated 3 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆14Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆11Updated 7 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆9Updated 4 years ago
- Dump Windows registry hives as text.☆16Updated 6 years ago
- A utility to run ELF files in memory.☆15Updated 3 years ago
- ☆17Updated 3 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆15Updated 4 months ago
- Zombie Content management systems exploitation Bot Source☆10Updated 3 years ago
- ☆14Updated 3 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- ☆15Updated 2 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- ☆18Updated 3 years ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆9Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago