Local Privilege Escalation Miner
☆32Apr 11, 2022Updated 3 years ago
Alternatives and similar repositories for Miner
Users that are interested in Miner are comparing it to the libraries listed below
Sorting:
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated last year
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- ☆11Nov 12, 2023Updated 2 years ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 5 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- IndoXploit Webshell V.3☆14Oct 31, 2019Updated 6 years ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Mar 26, 2022Updated 3 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 4 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- Customized Kali Linux - Ansible playbook☆67Dec 7, 2020Updated 5 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Golang Port Knocking for Linux + Windows☆18Feb 22, 2022Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆74May 19, 2017Updated 8 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- ☆33Jan 23, 2025Updated last year