FlatL1neAPT / Red-Team-softLinks
☆18Updated 7 years ago
Alternatives and similar repositories for Red-Team-soft
Users that are interested in Red-Team-soft are comparing it to the libraries listed below
Sorting:
- ☆18Updated 7 years ago
- ☆40Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- Payload encoder for bypass WAF☆16Updated 6 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Updated 6 years ago
- Executables that execute other stuff☆54Updated 7 years ago
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- WAF Exploitation Framework☆13Updated 2 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Updated 7 years ago
- Repo for proof of concept exploits and tools.☆56Updated 5 years ago
- Aggressor scripts for Cobalt Strike☆58Updated 5 years ago
- ☆11Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 6 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- Burp Suite extension to help make Graphql request more readable☆33Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆54Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- ☆50Updated 5 years ago
- ☆29Updated 5 years ago
- Upgrade your netcat shell today!☆58Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Metasploit Framework☆31Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- Win32k Elevation of Privilege Poc☆24Updated 6 years ago
- ☆61Updated 2 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Updated 7 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- ☆17Updated 7 years ago
- Windows 10 Exploit☆30Updated 7 years ago