zux0x3a / dns-black-catView external linksLinks
Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands in shell mode over DNS protocol
☆114Sep 15, 2022Updated 3 years ago
Alternatives and similar repositories for dns-black-cat
Users that are interested in dns-black-cat are comparing it to the libraries listed below
Sorting:
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆166Dec 10, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Mar 27, 2022Updated 3 years ago
- Web shell generator and command line interface.☆85Oct 2, 2020Updated 5 years ago
- ☆94Jan 17, 2022Updated 4 years ago
- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM syste…☆281Sep 14, 2022Updated 3 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- A little tool to play with Outlook☆207Nov 11, 2021Updated 4 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆624May 2, 2025Updated 9 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Oct 17, 2025Updated 4 months ago
- A PowerShell armoury for security guys and girls☆467Jan 23, 2024Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆863Mar 20, 2023Updated 2 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- the only php webshell you need.☆228Mar 18, 2025Updated 10 months ago
- Open source C2 server created for stealth red team operations☆838Sep 26, 2022Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Dec 22, 2021Updated 4 years ago
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆48Aug 19, 2021Updated 4 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- Simple executable generator with encrypted shellcode.☆280Oct 3, 2022Updated 3 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64May 18, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 2 years ago
- c++ fully undetected shellcode launcher ;)☆977Jun 11, 2021Updated 4 years ago