CSLDepend / exploitsLinks
We store attacks and exploits that we've found useful in our research
☆13Updated 10 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- DNS Botnet Server and Client☆35Updated last week
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- ☆50Updated 7 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- ☆24Updated 7 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- reveal xored strings in mirai binary☆12Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- A Linux RAT in C☆35Updated 6 years ago
- rev shell and manager in go☆20Updated 5 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Updated 11 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago