vandavey / DotnetCat
Remote command shell application written in C#, targeting the .NET 8 runtime.
☆27Updated this week
Related projects ⓘ
Alternatives and complementary repositories for DotnetCat
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 5 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- ☆8Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Updated last year
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 3 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Minimalist Custom .NET Core Garbage Collector☆21Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆18Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Application for administer multidomain Active Directory-based networks☆25Updated 2 weeks ago
- Inject code into .net applications☆11Updated 6 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆13Updated 3 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- The evolution of NxRansomware☆10Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago