D4stiny / Dell-Support-Assist-RCE-PoC
☆167Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Dell-Support-Assist-RCE-PoC
- A PowerShell example of the Windows zero day priv esc☆321Updated 6 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 6 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆112Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆118Updated 6 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Updated 5 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆147Updated 5 years ago
- CVE-2018-10933 very simple POC☆127Updated 6 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆218Updated 6 years ago
- Public work for CVE-2019-0708☆289Updated 5 years ago
- A code demonstrating CVE-2018-0886☆262Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- APT34/OILRIG leak☆231Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- The full story of the CLR implementation of Meterpreter☆149Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆92Updated 3 years ago
- Public repository for improvements to the EXTRABACON exploit☆158Updated 8 years ago
- A bunch of useful SSH tools for powershell☆118Updated 6 years ago
- Some scripts and exploits☆142Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆158Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 6 years ago