vandavey / DotnetCatLinks
Remote command shell application written in C# targeting the .NET 9.0 runtime.
☆29Updated 9 months ago
Alternatives and similar repositories for DotnetCat
Users that are interested in DotnetCat are comparing it to the libraries listed below
Sorting:
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- Application for administer multidomain Active Directory-based networks☆29Updated 3 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- ☆76Updated last year
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆81Updated last year
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 7 years ago
- Custom pentesting tools☆25Updated 4 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 5 months ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Obtain and parse SSL certificates☆87Updated 3 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26Updated 6 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- ☆15Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Inject code into .net applications☆12Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Open source tool for static analysis of malwares.☆29Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Updated 4 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆48Updated 5 months ago