Local Privilege Escalation Miner
☆32Apr 11, 2022Updated 4 years ago
Alternatives and similar repositories for Miner
Users that are interested in Miner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 5 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Run commands on linux through those pesky firewalls☆32Jul 21, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated 2 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆26Oct 2, 2021Updated 4 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Customized Kali Linux - Ansible playbook☆67Dec 7, 2020Updated 5 years ago
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- Blackhat 2025 presentation and codebase: AI SOC agent & MCP server for automated security investigation, alert triage, and incident respo…☆28Dec 28, 2025Updated 4 months ago
- ☆12Nov 12, 2023Updated 2 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 4 months ago
- In line function hooking LKM rootkit☆54Mar 5, 2020Updated 6 years ago
- Repository For CTF Write-ups☆17Sep 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- It's what all the kids are talking about☆12Apr 25, 2023Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Zextras Technical Documentation☆13Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Windows NTLM Authentication Backdoor☆18Jan 27, 2022Updated 4 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Bash Shell Script Cryptography☆14Jan 2, 2022Updated 4 years ago
- IndoXploit Webshell V.3☆15Oct 31, 2019Updated 6 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago