Proof of Concept for CVE-2018-11776
☆21Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for Strutter
Users that are interested in Strutter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Sep 2, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆37Aug 31, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Download files out of open AWS buckets☆39Dec 12, 2018Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 5 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Multi-threaded web application directory bruteforcer☆29Feb 4, 2019Updated 7 years ago
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Embed binary into golang binary☆11Oct 5, 2016Updated 9 years ago
- Python IDE for working with plots and data☆17Jun 4, 2017Updated 8 years ago
- A simple XSS finding tool☆112Nov 9, 2018Updated 7 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Sep 22, 2018Updated 7 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 8 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Sep 16, 2024Updated last year
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 9 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆28Aug 17, 2021Updated 4 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Code that allows running another windows PE in the same address space as the host process.☆10Nov 19, 2019Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Rust on the Quansheng UV-K5 Radio☆10Jul 9, 2024Updated last year
- Website for Reticulum☆23Jan 17, 2026Updated 3 months ago