4nuit / Hacking
Just a few more hacking notes, techniques and tools
☆18Updated last week
Alternatives and similar repositories for Hacking:
Users that are interested in Hacking are comparing it to the libraries listed below
- EDR & Antivirus Bypass to Gain Shell Access☆234Updated 6 months ago
- Automation tool to testing and confirm the xss vulnerability.☆231Updated this week
- Lab used for workshop and CTF☆177Updated 2 months ago
- POC exploit for CVE-2024-49138☆248Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆152Updated last month
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 5 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆115Updated last month
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- ☆92Updated 2 weeks ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆93Updated 7 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆369Updated 3 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆49Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆358Updated 6 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆230Updated 3 weeks ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated last year
- This is for Ethical Use only.☆279Updated last week
- PoC for CVE-2024-48990☆98Updated 4 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆96Updated last month
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆339Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆127Updated 2 months ago
- Polymorphic Command & Control☆74Updated last month
- ☆94Updated last month
- A list of all Active Directory machines from HackTheBox☆57Updated last week
- Helios: Automated XSS Testing☆148Updated 8 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆411Updated 3 weeks ago
- ☆448Updated last week
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 7 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆40Updated 7 months ago