Tomcat backdoor based on CS blog
☆29Jun 30, 2023Updated 2 years ago
Alternatives and similar repositories for TomcatBackdoorPoC
Users that are interested in TomcatBackdoorPoC are comparing it to the libraries listed below
Sorting:
- ☆18Oct 28, 2025Updated 4 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Jun 8, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- StenographyShellcodeLoader☆43Sep 8, 2020Updated 5 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- ☆47Feb 11, 2023Updated 3 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- IoM defualt mal package☆10Feb 22, 2026Updated last week
- ☆31Jul 26, 2024Updated last year
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 7 months ago
- ☆46Jun 21, 2023Updated 2 years ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆209Nov 12, 2025Updated 3 months ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Jun 30, 2020Updated 5 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Nov 9, 2023Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆13Mar 5, 2024Updated last year
- ☆15Jan 26, 2023Updated 3 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Aug 11, 2022Updated 3 years ago