Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands in shell mode over DNS protocol
☆114Sep 15, 2022Updated 3 years ago
Alternatives and similar repositories for dns-black-cat
Users that are interested in dns-black-cat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- ☆94Jan 17, 2022Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Web shell generator and command line interface.☆85Oct 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Oct 31, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆168Dec 10, 2021Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64May 18, 2021Updated 4 years ago
- A little tool to play with Outlook☆206Nov 11, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple executable generator with encrypted shellcode.☆281Oct 3, 2022Updated 3 years ago
- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM syste…☆282Sep 14, 2022Updated 3 years ago
- the only php webshell you need.☆231Mar 18, 2025Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆994Oct 7, 2022Updated 3 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- A PowerShell armoury for security guys and girls☆468Jan 23, 2024Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆873Mar 20, 2023Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A C2 post-exploitation framework☆486Jan 24, 2024Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Hide your payload in DNS☆613May 3, 2023Updated 2 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 5 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SniperPhish - The Web-Email Spear Phishing Toolkit☆626May 2, 2025Updated 11 months ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆938Nov 11, 2024Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Dec 22, 2021Updated 4 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆176Mar 30, 2022Updated 4 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- Open source C2 server created for stealth red team operations☆839Sep 26, 2022Updated 3 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago