LeonardoNve / edm
Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2
☆41Updated 6 years ago
Alternatives and similar repositories for edm:
Users that are interested in edm are comparing it to the libraries listed below
- Socks5 server over Websockets☆40Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆31Updated 10 months ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆43Updated 7 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- ☆15Updated 9 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆25Updated 6 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Random source codes☆25Updated 4 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 7 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago