Abuse Zabbix API to obtain Remote Command Execution on hosts
☆18Jun 4, 2021Updated 4 years ago
Alternatives and similar repositories for ZabbixAPIAbuse
Users that are interested in ZabbixAPIAbuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 7 years ago
- ☆46Aug 15, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- ☆14Dec 5, 2024Updated last year
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆10Sep 12, 2024Updated last year
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- ☆14May 16, 2023Updated 2 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- ☆20Jan 6, 2025Updated last year
- This repo is a curated list of places I consider for weekends in Athens with my kid.☆11Dec 19, 2021Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆13Dec 4, 2024Updated last year
- ☆16Dec 21, 2023Updated 2 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- A Node.js module that helps users create, find, and join "events" such as a multiplayer game. You may think of this as a matchmaking lob…☆15Jul 28, 2025Updated 7 months ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Basic network port scanner created in C#☆19Aug 1, 2019Updated 6 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆47Apr 7, 2025Updated 11 months ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- Sample code for "Reflections on trusting trust" by Ken Thompson☆13May 19, 2018Updated 7 years ago