D4stiny / Dell-Support-Assist-RCE-PoC
☆167Updated 5 years ago
Alternatives and similar repositories for Dell-Support-Assist-RCE-PoC:
Users that are interested in Dell-Support-Assist-RCE-PoC are comparing it to the libraries listed below
- A simple embedded Linux backdoor.☆197Updated 4 years ago
- A PowerShell example of the Windows zero day priv esc☆324Updated 6 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Public work for CVE-2019-0708☆290Updated 5 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆219Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆118Updated 7 years ago
- HP printer security research code☆90Updated 7 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- CVE-2018-10933 very simple POC☆128Updated 6 years ago
- UAC 0day, all day!☆277Updated 7 years ago
- Windows Remote Post Breach Tool via Telegram☆132Updated 7 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆116Updated 9 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year
- ☆206Updated 4 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- CVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!☆226Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆149Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Updated 5 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago