0xbigshaq / luajit-pwn
Vuln-dev environment for LuaJIT
☆16Updated last year
Related projects: ⓘ
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆12Updated last year
- ☆25Updated this week
- all credits go to @mgeeky☆58Updated 2 years ago
- ☆15Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated 10 months ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆26Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Updated last year
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- Exactly what it sounds like, which is something rad☆20Updated last year
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆22Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆29Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆42Updated 2 years ago
- CVE-2020-0688 PoC☆10Updated 3 years ago
- ☆18Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆15Updated last year
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆26Updated last year
- Cobalt Strike Get clipboard plugin☆12Updated last year
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 3 years ago
- ☆14Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- CVE-2022-43684☆11Updated last year
- Ntdll Unhooking POC☆19Updated 2 years ago
- leaking net-ntlm with webdav☆24Updated 3 years ago
- ☆23Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 6 months ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 2 years ago