LucasPDiniz / CVE-2023-38408Links
Takeover Account OpenSSH
☆36Updated last year
Alternatives and similar repositories for CVE-2023-38408
Users that are interested in CVE-2023-38408 are comparing it to the libraries listed below
Sorting:
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆134Updated 2 weeks ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- RCE Exploit For Maltrail-v0.53☆52Updated 2 years ago
- PowerShell Obfuscator☆223Updated 3 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆84Updated 5 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆43Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- CVE-2023-38831 PoC (Proof Of Concept)☆89Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆88Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 7 months ago
- A blind SQL injection brute forcer☆113Updated 7 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- ☆65Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated last year
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- ☆65Updated 2 years ago
- The Havoc Framework☆61Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆94Updated 2 weeks ago
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.☆49Updated last year
- ☆74Updated 10 months ago
- What the name says....☆104Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 7 months ago