xct / rcatLinks
rcat
☆72Updated 3 years ago
Alternatives and similar repositories for rcat
Users that are interested in rcat are comparing it to the libraries listed below
Sorting:
- ☆62Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆140Updated 2 years ago
- ☆73Updated 8 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated last month
- SeRestorePrivilege to SYSTEM☆130Updated 4 years ago
- ☆99Updated 10 months ago
- ☆94Updated 10 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- AV Evasion Techniques☆82Updated 3 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 9 months ago
- ☆37Updated 8 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆182Updated 3 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆186Updated 7 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆175Updated last month
- Get SYSTEM via SeDebugPrivilege☆23Updated 3 years ago
- Local & remote Windows DLL Proxying☆169Updated last year
- Automated exploitation of MSSQL servers at scale☆128Updated 2 weeks ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆272Updated last month
- Rusty Impersonate☆102Updated last month
- ☆29Updated last year
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆124Updated 2 weeks ago
- ☆79Updated 10 months ago
- ☆119Updated 8 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆133Updated 3 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆132Updated 10 months ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago