This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft
☆25May 5, 2022Updated 3 years ago
Alternatives and similar repositories for nimbuspwn
Users that are interested in nimbuspwn are comparing it to the libraries listed below
Sorting:
- ☆64Apr 28, 2022Updated 3 years ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Protect domains from malicious browser extensions☆17Apr 16, 2025Updated 10 months ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆26Jan 3, 2025Updated last year
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆20Mar 26, 2022Updated 3 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆41May 14, 2022Updated 3 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated 2 weeks ago
- A Real-Time Monitoring Tool for BitTorrent DHT Traffic☆30May 5, 2018Updated 7 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- PoC for CVE-2022-1388_F5_BIG-IP☆58May 15, 2022Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- CVE-2022-42889 aka Text4Shell research & PoC☆20Mar 17, 2023Updated 2 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- PHP 7 and safe-build update of the popular C99 variant of PHP Shell with MySQL support☆29Dec 1, 2019Updated 6 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- See where your exe size comes from.☆29May 11, 2023Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- My personal profile!☆17Oct 25, 2024Updated last year
- Sample Android App for ALL made with ❤️☆11Oct 1, 2017Updated 8 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago