MauroEldritch / GEVAUDANLinks
Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!
☆10Updated 5 years ago
Alternatives and similar repositories for GEVAUDAN
Users that are interested in GEVAUDAN are comparing it to the libraries listed below
Sorting:
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11Updated 5 years ago
- The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024☆11Updated 5 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆28Updated 8 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago
- A simple remote scanner for Liferay Portal☆18Updated 3 months ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- ☆21Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 5 years ago
- Horizontal Brute Forcing tool for OWA☆9Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- Tests AD passwords while respecting Bad Password Count☆18Updated 6 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 6 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- ☆20Updated 5 years ago
- ☆17Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 2 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago