0x4meliorate / SEBUAView external linksLinks
Social Engineering Browser Update Attack.
☆57Nov 12, 2023Updated 2 years ago
Alternatives and similar repositories for SEBUA
Users that are interested in SEBUA are comparing it to the libraries listed below
Sorting:
- ☆12Jun 22, 2022Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆40May 5, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Sep 29, 2023Updated 2 years ago
- ☆61Dec 15, 2023Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Feb 4, 2026Updated last week
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆175Feb 27, 2024Updated last year
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- Python-based vulnerability detection tool for web applications☆17Jul 31, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- Different methods to get current username without using whoami☆185Feb 12, 2024Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Oct 10, 2023Updated 2 years ago
- exploit for cve-2023-47246 SysAid RCE (shell upload)☆53Dec 7, 2023Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Oct 2, 2023Updated 2 years ago
- Create and enumerate hidden desktops.☆89Dec 12, 2023Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆212Jan 2, 2023Updated 3 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- Crack Everything for CrackMapExec version 6☆21Jul 1, 2024Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- ChatGPT terminal assistant with a good memory to be used in ethical hacking, offensive cybersecurity and red teaming. **Warning:** These …☆10Mar 20, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆13Nov 30, 2023Updated 2 years ago