0xor0ne / ssfsLinks
Simple Secure Static (HTTPS) File Server with embedded certificate
☆46Updated 2 years ago
Alternatives and similar repositories for ssfs
Users that are interested in ssfs are comparing it to the libraries listed below
Sorting:
- Keycloak admin API allows low privilege users to use administrative functions☆28Updated 9 months ago
- vulnlab.com reaper writeup☆26Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- ☆57Updated 8 months ago
- POC for DLL Proxying / Hijacking☆61Updated 2 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ECC Public Key Cryptography☆39Updated last year
- ☆59Updated last year
- Make an Linux Kernel rootkit visible again.☆55Updated 5 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- ☆35Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated last year
- OSED Practice binary☆24Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 6 months ago
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆64Updated 10 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 10 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated 2 weeks ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 11 months ago
- Rust bindings to Microsoft Windows users / groups management API☆33Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 10 months ago