vandavey / DotnetCatLinks
Remote command shell application written in C# targeting the .NET runtime.
☆29Updated last week
Alternatives and similar repositories for DotnetCat
Users that are interested in DotnetCat are comparing it to the libraries listed below
Sorting:
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last week
- Application for administer multidomain Active Directory-based networks☆29Updated last month
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 8 months ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆39Updated 5 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆81Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Updated 4 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Updated last year
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Updated 4 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26Updated 6 years ago
- Custom pentesting tools☆26Updated 5 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Open source tool for static analysis of malwares.☆28Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Python script that automate the process of generating various reverse shells.☆15Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- C# multi threaded TCP port scanner console application.☆50Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Public exploits☆16Updated 7 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Updated 5 years ago