JameelNabbo / browser-exploit-POCLinks
☆41Updated 7 years ago
Alternatives and similar repositories for browser-exploit-POC
Users that are interested in browser-exploit-POC are comparing it to the libraries listed below
Sorting:
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated 2 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 6 years ago
- Some personal exploits/pocs☆55Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- ☆50Updated 4 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 4 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Updated 6 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- A Linux RAT in C☆34Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆22Updated last year
- ☆31Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- OneDrive < 20.073 privilege escalation☆9Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆32Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated 2 weeks ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago