Lucifer
pwncat
Our great sponsors
Lucifer | pwncat | |
---|---|---|
1 | 3 | |
335 | 2,349 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | about 1 year ago | |
Python | Python | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Lucifer
pwncat
-
Take the first steps to harden your Kubernetes cluster
We're using pwncat-cs to listen for incoming connections and elevate to a shell. Log into the EC2 VM and run:
-
Pwncat usage on the exam
Did anyone ever use Pwncat (https://github.com/calebstewart/pwncat) on the exam, ofcourse without the automatic exploitation features? If so, was it allowed? If anyone has any idea or other suggestion please let me know! :)
- Rustcat | A Modern Netcat Alternative
What are some alternatives?
evillimiter - Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
pwncat - Fancy reverse and bind shell handler
meerk40t - Hackable Laser software for the K40 Stock-LIHUIYU laser boards.
rustcat - Rustcat(rcat) - The modern Port listener and Reverse shell
heimdall-framework - USB threat evaluation framework for Linux
pwncat - pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
robot_hacking_manual - Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
GTFONow - Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
cloud-lusat - Cloud Internal Threat Intelligence Feeds, Inventory and Compliance Data Collection
ncat-chat - two dummy/minimalist bash scripts for client/server chatting using ncat/netcat