Spnl48 / PSInjector
Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target process and get the target process to execute the injected code.
☆14Updated last year
Related projects: ⓘ
- ☆23Updated this week
- ☆21Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆10Updated last year
- ☆24Updated 10 months ago
- ☆19Updated this week
- MacroExploit use in excel sheet☆20Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆31Updated 11 months ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆13Updated last year
- Enumeration & fingerprint tool☆23Updated 6 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 5 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated last month
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated last month
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆15Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆78Updated 8 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆20Updated 4 months ago
- Modular framework to exploit UPS devices☆61Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- ShootCutMe an .LNK file creator tool for redteamer☆14Updated last year
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated last year
- Tool for scanning domains for .git directories.☆13Updated 11 months ago