xct / rcatLinks
rcat
☆71Updated 3 years ago
Alternatives and similar repositories for rcat
Users that are interested in rcat are comparing it to the libraries listed below
Sorting:
- ☆61Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆122Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆138Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆142Updated 5 months ago
- ☆71Updated 6 months ago
- ☆91Updated 8 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- ☆95Updated 7 months ago
- Rusty Impersonate☆101Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆171Updated last month
- PrintNightmare (CVE-2021-34527) PoC Exploit☆115Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆161Updated 2 months ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- ☆52Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆21Updated 3 years ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆237Updated 2 weeks ago
- ☆29Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆107Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 7 months ago
- ☆70Updated 7 months ago
- My implementation of the GIUDA project in C++☆186Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- Umbrella will protect your shellcode from the rain.☆30Updated 3 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year
- AV Evasion Techniques☆79Updated 3 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆121Updated 3 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year