Proof of Concept for CVE-2018-11776
☆21Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for Strutter
Users that are interested in Strutter are comparing it to the libraries listed below
Sorting:
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A simple XSS finding tool☆110Nov 9, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Jan 17, 2026Updated last month
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Sep 16, 2024Updated last year
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- ☆27Jun 4, 2018Updated 7 years ago
- Python's interface to codec 2☆25Dec 27, 2025Updated 2 months ago