GhostTroops / shallot_eschalotLinks
create customized .onion addresses for your hidden service,make shallot and eschalot tools
☆13Updated 3 years ago
Alternatives and similar repositories for shallot_eschalot
Users that are interested in shallot_eschalot are comparing it to the libraries listed below
Sorting:
- Magento Security Scanner☆15Updated 3 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- ☆17Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Windows 权限提升 BadPotato☆13Updated 3 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- ☆18Updated 4 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- jgraphx 4.0.4 build for cs project☆22Updated 4 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- ☆18Updated 6 months ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- golang String Obfuscate☆9Updated 3 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- The best way to send emails in Go.☆10Updated 4 years ago