0xf15h / uokoo_exploitLinks
Post-Auth RCE & Persistence on UOKOO Security Cameras
☆12Updated 5 years ago
Alternatives and similar repositories for uokoo_exploit
Users that are interested in uokoo_exploit are comparing it to the libraries listed below
Sorting:
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆43Updated 4 years ago
- 🔥 Pentest Cheat Sheet☆37Updated 4 years ago
- Passwordless RDP Session Hijacking☆68Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 5 years ago
- A powerful reverse shell generator☆45Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Router socks. One port socks for all the others.☆68Updated last year
- Build myself for cs project☆12Updated 5 years ago
- A proof-of-concept Node.js ransomware☆21Updated 3 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆12Updated 5 years ago
- cross-platform C2 framework in python 2☆39Updated 3 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆25Updated 6 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 4 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated 4 months ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated last year
- Stealthy Stand Alone PHP Web Shell☆33Updated 6 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 11 months ago
- Python script that automate the process of generating various reverse shells.☆16Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago