A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept
☆16Mar 11, 2024Updated last year
Alternatives and similar repositories for shellfeck
Users that are interested in shellfeck are comparing it to the libraries listed below
Sorting:
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- ☆168Feb 29, 2024Updated last year
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- ☆15Jan 26, 2023Updated 3 years ago
- ☆26Mar 11, 2025Updated 11 months ago
- 哥斯拉Confluence后渗透插件 MakeToken SearchPage ListAllUser AddAdminUser ListAllPage ........☆18Jun 14, 2022Updated 3 years ago
- A malicous Golang Package☆15Apr 21, 2025Updated 10 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- ☆65Mar 15, 2024Updated last year
- Exploit for CVE-2024-27198 - TeamCity Server☆35Dec 19, 2024Updated last year
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information☆34Jul 19, 2024Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆22Dec 30, 2025Updated last month
- 🚀 Professional multi-wallet trading platform for Solana blockchain. Execute coordinated bundle trades, create volume spikes, and maximiz…☆28Jan 3, 2026Updated last month
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- ☆22Jun 9, 2025Updated 8 months ago
- ☆26Jan 7, 2024Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Oct 12, 2023Updated 2 years ago
- A simple website to act as a store for havoc modules and extensions☆28Jan 20, 2025Updated last year
- WallEscape vulnerability in util-linux☆51Mar 30, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆58Jul 9, 2024Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year