xct / rcatLinks
rcat
☆70Updated 3 years ago
Alternatives and similar repositories for rcat
Users that are interested in rcat are comparing it to the libraries listed below
Sorting:
- ☆61Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆137Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆145Updated 6 months ago
- SeRestorePrivilege to SYSTEM☆124Updated 4 years ago
- ☆71Updated 6 months ago
- ☆97Updated 8 months ago
- Automated exploitation of MSSQL servers at scale☆120Updated this week
- Rusty Impersonate☆100Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆116Updated 2 years ago
- ☆92Updated 8 months ago
- Local & remote Windows DLL Proxying☆165Updated last year
- ☆52Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆173Updated 6 months ago
- Rust in-memory dumper☆108Updated 2 years ago
- ☆119Updated 6 months ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Umbrella will protect your shellcode from the rain.☆30Updated 4 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆137Updated 2 months ago
- AV Evasion Techniques☆79Updated 3 years ago
- My implementation of the GIUDA project in C++☆187Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated 2 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆67Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Get SYSTEM via SeDebugPrivilege☆21Updated 3 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆27Updated 8 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆146Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆120Updated last year