LucasPDiniz / CVE-2023-38408
Takeover Account OpenSSH
☆19Updated 2 months ago
Related projects: ⓘ
- ☆117Updated 3 years ago
- RCE Exploit For Maltrail-v0.53☆39Updated 10 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆91Updated 8 years ago
- Check bitrix vulnerabilities☆54Updated 7 months ago
- CVE-2023-38831 PoC (Proof Of Concept)☆62Updated last month
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆148Updated 7 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆118Updated 2 weeks ago
- Nuclei templates for honeypots detection.☆185Updated 10 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆98Updated last month
- Hide an IP address in scripts using hex/decimal/octal conversions☆63Updated 9 months ago
- ☆88Updated 9 months ago
- Persistent Powershell backdoor tool {😈}☆106Updated last month
- Tool for hiding Kali Linux on the network☆295Updated 4 months ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆219Updated this week
- Hades Basic Command & Control Server☆85Updated 9 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆115Updated 9 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆124Updated 2 months ago
- This is a script written in Python that allows the exploitation of the Metabase's software security flaw described in CVE-2023-38646.☆23Updated 2 months ago
- Reverse shell that can bypass windows defender detection☆151Updated 7 months ago
- A collection of offensive Go packages inspired by different Go repositories.☆203Updated 3 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆78Updated 8 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆295Updated 3 weeks ago
- Red Team Guides☆134Updated 8 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆144Updated 3 months ago
- PacketSpy☆130Updated 3 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆122Updated 2 months ago
- ☆57Updated 9 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆39Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆127Updated 2 weeks ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆97Updated last year