LeakIX / l9fuzzLinks
Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload
☆11Updated 4 years ago
Alternatives and similar repositories for l9fuzz
Users that are interested in l9fuzz are comparing it to the libraries listed below
Sorting:
- Very loud vBulletin exploit☆14Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- A basic proxylogon scanner☆27Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago
- ☆12Updated 8 months ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- ☆42Updated 10 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- ☆12Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Updated 4 years ago
- A little implant which SSH's back with a shell☆38Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13Updated 8 months ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Updated 2 months ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 5 years ago
- ☆15Updated 5 years ago
- leaking net-ntlm with webdav☆26Updated 4 years ago