AymanRbati / root-detection-bypass
A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).
☆25Updated 2 months ago
Related projects: ⓘ
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last month
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- ☆24Updated 10 months ago
- ☆20Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆16Updated 2 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆12Updated last month
- wsnet☆23Updated last month
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆20Updated last month
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- visually see issues with supported cipher suites☆14Updated 3 months ago
- Burp extension used to snip any header from all the requests.☆21Updated 10 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 5 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated 7 months ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆22Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated 6 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆21Updated 6 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated last month
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆12Updated 4 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆26Updated 5 months ago
- ☆11Updated 9 months ago
- H&E- Burp Highlighter and Extractor☆17Updated last year
- ☆20Updated this week
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆15Updated 2 weeks ago
- Yet, Another Packer/Loader☆25Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Right-To-Left Override POC☆34Updated 2 years ago
- ☆28Updated last year
- ☆19Updated this week