MarioVilas / thetick
A simple backdoor for servers and embedded systems.
☆13Updated 3 years ago
Alternatives and similar repositories for thetick:
Users that are interested in thetick are comparing it to the libraries listed below
- A tool to abuse Exchange services☆10Updated last year
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated last year
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Explanation and PoC for CVE-2020-16152☆12Updated 4 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆19Updated 3 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Template repo for Conjur repositories☆17Updated 3 years ago
- RCE in NPM VSCode Extension☆20Updated 3 years ago
- ☆12Updated last year
- ☆13Updated last year
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- MySQL Injection Exfoliation Optimization☆22Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 2 months ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- Zoho ManageEngine Desktop Central CVEs☆16Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆44Updated 3 years ago