xct / rcatLinks
rcat
☆75Updated 3 years ago
Alternatives and similar repositories for rcat
Users that are interested in rcat are comparing it to the libraries listed below
Sorting:
- ☆63Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆146Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆132Updated 4 years ago
- ☆75Updated 10 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 2 months ago
- AV Evasion Techniques☆83Updated 3 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- Rusty Impersonate☆103Updated 3 months ago
- ☆29Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 5 months ago
- CLI monitor for windows process- & file activity☆95Updated 5 years ago
- ☆94Updated last year
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- My implementation of the GIUDA project in C++☆188Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆24Updated 3 years ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Updated 9 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆23Updated 11 months ago
- Attempt at Obfuscated version of SharpCollection☆241Updated 2 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆140Updated 3 years ago
- Automated exploitation of MSSQL servers at scale☆127Updated this week
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆26Updated last year
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆184Updated 10 months ago
- ☆103Updated last week
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Updated 3 years ago
- ☆28Updated 3 years ago
- ☆37Updated 9 months ago