JameelNabbo / browser-exploit-POCLinks
☆41Updated 7 years ago
Alternatives and similar repositories for browser-exploit-POC
Users that are interested in browser-exploit-POC are comparing it to the libraries listed below
Sorting:
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated last month
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 6 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- A Linux RAT in C☆33Updated 6 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated 2 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆24Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 5 years ago
- C# AV bypass jank☆32Updated 4 years ago
- DLInjector for Graphical User Interface.☆35Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆57Updated 3 years ago
- with metasploit☆63Updated 5 years ago
- ☆50Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated 6 months ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- ☆17Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago