RickdeJager / cupshax
☆230Updated 6 months ago
Alternatives and similar repositories for cupshax:
Users that are interested in cupshax are comparing it to the libraries listed below
- PoC for CVE-2024-48990☆98Updated 4 months ago
- Proof of concept & details for CVE-2025-21298☆169Updated 2 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆174Updated last week
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆125Updated 3 weeks ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆132Updated 10 months ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆174Updated 5 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆193Updated 4 months ago
- A command and control framework written in rust.☆316Updated last month
- CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web …☆82Updated 8 months ago
- POC exploit for CVE-2024-49138☆247Updated last month
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆250Updated 7 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆230Updated last year
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆132Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆246Updated this week
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 6 months ago
- Nameless C2 - A C2 with all its components written in Rust☆262Updated 6 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆389Updated 4 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆117Updated last month
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆178Updated 6 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆252Updated 2 months ago
- A (small) web exploit framework☆84Updated last month
- CVE-2024-3400 Palo Alto OS Command Injection☆157Updated 11 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆374Updated 7 months ago
- nysm is a stealth post-exploitation container.☆245Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆253Updated 10 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- CVE-2024-32002 RCE PoC☆105Updated 10 months ago
- A delicious, but malicious SSL-VPN server 🌮☆215Updated 4 months ago
- Repository to store exploits created by Assetnotes Security Research team☆176Updated last year