Proof of Concept for CVE-2018-11776
☆21Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for Strutter
Users that are interested in Strutter are comparing it to the libraries listed below
Sorting:
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Multi-threaded web application directory bruteforcer☆28Feb 4, 2019Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Python IDE for working with plots and data☆17Jun 4, 2017Updated 8 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Sep 16, 2024Updated last year
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 2 weeks ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆95Feb 23, 2019Updated 7 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Code that allows running another windows PE in the same address space as the host process.☆11Nov 19, 2019Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago