☆232Sep 27, 2024Updated last year
Alternatives and similar repositories for cupshax
Users that are interested in cupshax are comparing it to the libraries listed below
Sorting:
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- ☆158Jul 10, 2024Updated last year
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆184Oct 2, 2024Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆215Oct 19, 2024Updated last year
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- ☆41Mar 12, 2025Updated 11 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆690Aug 27, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- PoC☆12Apr 7, 2025Updated 11 months ago
- ☆15May 3, 2024Updated last year
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- Our Tips&Tricks☆145Updated this week
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆96Nov 14, 2024Updated last year
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- ☆76Jan 27, 2025Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆863Feb 3, 2024Updated 2 years ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 10 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆149Aug 26, 2024Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- ☆73Feb 25, 2024Updated 2 years ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,019Feb 1, 2026Updated last month
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,410Jan 19, 2026Updated last month
- ☆168Feb 29, 2024Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- ☆46Jun 21, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- ☆568Mar 28, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Updated this week
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year