JameelNabbo / browser-exploit-POC
☆42Updated 6 years ago
Alternatives and similar repositories for browser-exploit-POC:
Users that are interested in browser-exploit-POC are comparing it to the libraries listed below
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆72Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆39Updated 6 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- A Linux RAT in C☆32Updated 6 years ago
- testing123☆11Updated 4 months ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- medium-rare☆28Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆24Updated 5 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 weeks ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago