vandavey / DotnetCatLinks
Remote command shell application written in C# targeting the .NET runtime.
☆28Updated this week
Alternatives and similar repositories for DotnetCat
Users that are interested in DotnetCat are comparing it to the libraries listed below
Sorting:
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last year
- Application for administer multidomain Active Directory-based networks☆29Updated 3 weeks ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆80Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆12Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 7 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Custom pentesting tools☆26Updated 5 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Updated 4 years ago
- Public exploits☆16Updated 7 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 5 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆39Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26Updated 6 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Updated 4 years ago
- Rust Weaponization for Red Team Engagements.☆12Updated 3 years ago
- Open source tool for static analysis of malwares.☆28Updated 5 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago