Tomcat backdoor based on CS blog
☆29Jun 30, 2023Updated 2 years ago
Alternatives and similar repositories for TomcatBackdoorPoC
Users that are interested in TomcatBackdoorPoC are comparing it to the libraries listed below
Sorting:
- ☆18Oct 28, 2025Updated 4 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆286Jun 8, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- StenographyShellcodeLoader☆43Sep 8, 2020Updated 5 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆90Nov 9, 2023Updated 2 years ago
- IoM defualt mal package☆10Feb 22, 2026Updated last month
- DiagTrack Eop (From Service Account to SYSTEM)☆24Jan 13, 2023Updated 3 years ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last week
- ☆48Feb 11, 2023Updated 3 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- enc8 密码碰撞脚本☆33Jan 31, 2023Updated 3 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- Weaponized HellsGate/SigFlip☆204Jun 7, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 4 months ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Dirfuzz by golang☆15Feb 28, 2023Updated 3 years ago
- jasypt Decrypt Encrypt☆14Jan 7, 2022Updated 4 years ago
- ☆125Jun 28, 2023Updated 2 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- 专为蚁剑编写的独立WebShell服务程序☆10Jan 31, 2025Updated last year
- 通过ptr记录使用ip反查内网域名☆16Sep 10, 2024Updated last year
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- ☆31Jul 26, 2024Updated last year
- ☆13Dec 27, 2014Updated 11 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago