Ekultek / bluekeep_CVE-2019-0708_poc_to_exploit
Porting BlueKeep PoC from @Ekultek to actual exploits
☆10Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for bluekeep_CVE-2019-0708_poc_to_exploit
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Framework for Making Environmental Keyed Payloads☆12Updated 8 years ago
- Collection of Nmap scripts☆10Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆22Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆21Updated 6 years ago
- PoC code for crashing windows active directory☆34Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Just another tool to screenshot web servers☆16Updated last year
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago