0xf15h / uokoo_exploitLinks
Post-Auth RCE & Persistence on UOKOO Security Cameras
☆12Updated 4 years ago
Alternatives and similar repositories for uokoo_exploit
Users that are interested in uokoo_exploit are comparing it to the libraries listed below
Sorting:
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- 🔥 Pentest Cheat Sheet☆37Updated 4 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- cross-platform C2 framework in python 2☆39Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Updated 4 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆12Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆23Updated 4 years ago
- Passwordless RDP Session Hijacking☆69Updated 4 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Updated 4 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 9 months ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 4 years ago