BigNerd95 / Chimay-RedLinks
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
☆661Updated 3 years ago
Alternatives and similar repositories for Chimay-Red
Users that are interested in Chimay-Red are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆520Updated 5 years ago
- RouterOS Security Research Tooling and Proof of Concepts☆897Updated 3 years ago
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 5 years ago
- Script to steal passwords from ssh.☆484Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆731Updated 8 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 5 years ago
- Auto Root Exploit Tool☆532Updated 2 years ago
- Smart Install Exploitation Tool☆589Updated 3 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Updated 7 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Updated 4 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆209Updated 8 years ago
- Scans for accessibility tools backdoors via RDP☆340Updated 7 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- Various PoCs☆492Updated 5 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆393Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆330Updated 4 years ago
- Micro$oft Windows Hacking Pack☆524Updated 7 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆483Updated 9 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 10 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆336Updated 6 years ago
- powerful auto-backdooring utility☆751Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆546Updated last year
- Blueborne CVE-2017-0785 Android information leak vulnerability☆469Updated 8 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated 2 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Updated 8 years ago
- Exploits and Security Tools Framework 2.0.1☆307Updated 3 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆268Updated 8 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆338Updated last year