A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.
☆168Jun 10, 2021Updated 4 years ago
Alternatives and similar repositories for Monitoring-Systems-Cheat-Sheet
Users that are interested in Monitoring-Systems-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- ☆10Oct 9, 2016Updated 9 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- Powershell-based Windows Security Auditing Toolbox☆573Jan 9, 2019Updated 7 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Interactive shellcoding environment to easily craft shellcodes☆907Feb 26, 2021Updated 5 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- ☆108Mar 21, 2017Updated 8 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- ☆349Mar 19, 2021Updated 4 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- Python Remote Administration Tool☆14Jan 8, 2017Updated 9 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Subdomain brute force focused on speed and data serialization☆75Dec 27, 2022Updated 3 years ago