LucasPDiniz / CVE-2023-38408Links
Takeover Account OpenSSH
☆36Updated last year
Alternatives and similar repositories for CVE-2023-38408
Users that are interested in CVE-2023-38408 are comparing it to the libraries listed below
Sorting:
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆141Updated last month
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- PowerShell Obfuscator☆226Updated 4 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Updated 5 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Lockbit, URSIF, BlackBasta etc.☆218Updated 2 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 9 months ago
- RCE Exploit For Maltrail-v0.53☆52Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 6 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆479Updated 4 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆427Updated last year
- Red Team Guides☆144Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- Tools and Resources for Physical Security Red Teaming☆46Updated last month
- ☆65Updated last year
- ☆104Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- ☆74Updated 11 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆217Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- List Of Ransomware Groups Official WebSites☆133Updated last week
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆98Updated last month