Record some Vulnerabilities
☆44Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for vuln
Users that are interested in vuln are comparing it to the libraries listed below
Sorting:
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- simple shellcode loader for linux & win, x86 & x64☆34Nov 5, 2016Updated 9 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- ☆20May 20, 2019Updated 6 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- IDS Bypass tricks☆122Jan 11, 2019Updated 7 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Jun 18, 2019Updated 6 years ago
- 在目标主机上执行php、asp、aspx 插件☆23Feb 1, 2019Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- 第一届爱奇艺安全沙龙 议题PPT分享☆83Nov 19, 2018Updated 7 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Translate SQL Injection Cheat Sheet(http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/) into Chinese.☆28Aug 11, 2015Updated 10 years ago
- Citrix ADC从权限绕过到RCE☆45Jul 12, 2020Updated 5 years ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- ☆41Nov 9, 2018Updated 7 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- ☆34Nov 4, 2018Updated 7 years ago