M507 / Miner
Local Privilege Escalation Miner
☆24Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Miner
- miscellaneous sploit scripts/hacks☆14Updated 4 months ago
- ☆10Updated 4 years ago
- An async Python client library for Empire's RESTful API☆24Updated 11 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- ☆11Updated 3 years ago
- Obtain and parse SSL certificates☆9Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- all credits go to @mgeeky☆58Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆17Updated this week
- Modular C2 server to tame your pack of wolves☆12Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- Some of my flag protected writeups☆11Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆19Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆49Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- PE File Blessing - To continue or not to continue☆86Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Updated 2 years ago