0dayNinja / 2021-25157Links
Aruba Instant (IAP) - Remote Code Execution Exploit
☆11Updated 4 years ago
Alternatives and similar repositories for 2021-25157
Users that are interested in 2021-25157 are comparing it to the libraries listed below
Sorting:
- Polkit D-Bus Authentication Bypass Exploit☆10Updated 4 years ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆14Updated 4 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆11Updated 4 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆51Updated 4 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆13Updated 4 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 11 months ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆11Updated 3 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Collections of way to evade normal detection events.☆25Updated 5 years ago
- AES Ransomware in batch☆11Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆15Updated 4 years ago
- Web App Pen Tester (Web Interface)☆32Updated 2 years ago
- recover Firefox and more browsers logins☆48Updated 3 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆16Updated 2 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆24Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Updated 7 years ago
- Windows Auto Post Exploitation - For ReD Team☆16Updated 6 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆14Updated 8 years ago
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- Pentest ToolKit☆28Updated 5 years ago